Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

WatchGuard Acquires ActZero to Accelerate Delivery of 24/7 MDR Services

WatchGuard acquired ActZero, a leading provider of MDR services with proactive, rapid and automated threat response and cross-platform AI-driven threat analysis designed to outpace threats at machine speed. This move further expands and matures WatchGuard’s innovative 24/7 MDR service and was signed and closed on December 17, 2024.

Emerging Threat: Windows LDAP CVE-2024-49113

CVE-2024-49113, also known as LDAPNightmare, is a high severity (CVSS score of 7.5) unauthenticated Denial of Service (DoS) vulnerability in Windows Lightweight Directory Access Protocol (LDAP). This vulnerability allows attackers to crash any unpatched Windows server with an internet-accessible DNS server by overwhelming a critical internal component of the operating system. Both CVE-2024-49113 and its relative, the critical RCE vulnerability CVE-2024-49112, were publicized in December 2024.

Enhance IT Monitoring with NAKIVO: Alarms and Reporting Explained

Using IT monitoring in an organization’s infrastructure can improve its reliability and help prevent serious issues, failures, and downtimes. There are different approaches to implementing IT monitoring, by either using dedicated tools or native functionality. With either approach, you can view the monitoring data when needed or configure automatic alerts and reports to be notified of important events. This blog post explains how to enhance the IT monitoring strategy by using alarms and reports.

Kovrr's Top 9 Cyber Loss Scenarios: A Year In Review

‍ ‍While each organization faces its own unique set of cyber risks that must be carefully assessed and managed in order to reach a state of resilience, certain events are nearly inevitable in today's threat environment, having the potential to create damaging ripple effects across the global market. Early in 2024, Kovrr's cyber risk quantification models identified these potential cyber incidents and loss scenarios most likely to impact organizations worldwide in the upcoming year.

Top 8 Device Fingerprinting Solutions

In industries like banking, e-commerce, and logistics, where millions of transactions occur daily, fraud often begins with a single malicious device. Attackers use proxies and VPNs to mimic legitimate users, but subtle clues — browser settings, session habits, or time zone mismatches – can expose their schemes. Device fingerprinting solutions have become essential for businesses aiming to enhance fraud prevention and improve user experience.

Effective API Throttling for Enhanced API Security

APIs are the backbone of modern digital ecosystems, but their misuse can expose systems to cyber threats. Effective API throttling not only optimizes performance but also acts as a critical defense mechanism against abuse, such as denial-of-service attacks. Discover how this powerful strategy enhances API security and safeguards your organization’s data in an interconnected world.

Supercharge Your Security Budget in 2025: Smarter Investments, Stronger Defence

Ever wonder how to get the most out of your cybersecurity budget without leaving your company vulnerable? Hey there, it’s Jim from Razorwire! In this episode, I sit down with cybersecurity pros Chris Dawson and Iain Pye to chat about smart spending when it comes to your cybersecurity budget. Whether you’re a big enterprise with a hefty budget or a small business wanting maximum impact on a small budget, we’ve got some actionable insights for you. Summary In this episode, we tackle one of the industry's most pressing challenges - how organisations allocate and manage their cybersecurity spending.

What To Do If You Click on a Phishing Link

If you click on a phishing link you should immediately disconnect your device from the internet, scan your device using antivirus software and keep a lookout for suspicious activity and transactions on your online accounts. Learn more about what a phishing link is and what to do if you click on a phishing link.

CrowdStrike Strengthens Container Security with Registry Scanning for Hybrid Clouds

Organizations of all sizes require security tools to meet their complex hybrid cloud needs. As their cloud environments and workloads evolve, this includes solutions that can scan for vulnerabilities in container images regardless of their location across public and private cloud environments. The problem is, most organizations lack this capability. Many use tools that don’t allow the flexibility to move quickly and scan their full breadth of cloud assets.