Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

How Prices are Set on the Dark Web: Exploring the Economics of Cybercrime

Finding the exact price of any product is now easier than ever. A quick check with your favorite online retailer will show that a GE Profile Dryer goes for $989, a 10-pack of Play-Doh can be had for $7.99, and a loaf of Pepperidge Farm Farmhouse Hearty White Sliced Bread is $3.59. Unfortunately, a glance at certain less legitimate online sites on the Dark Web is just as easy.

How API Vulnerabilities Expose Millions of Records in Just Minutes! #DataLeak #DataBreach

APIs are crucial for data flow, but they also open doors for rapid data breaches if security isn't real-time. In this video, we analyze how an API vulnerability led to a 250 million user data leak in just minutes. Learn why fast data flow in APIs requires immediate, real-time protection to prevent major damage. This case also highlights the often-overlooked importance of client-side security in API protection, especially as APIs are increasingly used in mobile apps and browsers. Discover essential insights to safeguard APIs from potential attacks.

Achieving Operational Resilience in an Increasingly Uncertain World

The EU’s Network and Information Systems Directive 2 (NIS2) for cybersecurity resilience entered full enforcement in October 2024, and compliance with its requirements presents major challenges for many companies, particularly those in the financial services sector. And while most IT leaders are confident of achieving NIS2 compliance, they also acknowledge that this cybersecurity directive has exacerbated existing challenges such as resource constraints and skills gaps.

Researching Illicit Streaming Devices with Graylog

In February 2024, I discovered a whisper campaign targeting folks in critical infrastructure with a pirate streaming box. While Illicit streaming devices are not new, this one is particularly ""chatty"". When I discovered it was communicating to qqcom, I knew I needed to start ingesting logs and needed a SIEM. I was able to quickly deploy Graylog and collect and correlate logs to understand behavior of the device.

2025 Security Predictions: The Forces Reshaping Cybersecurity

As 2025 approaches, cybersecurity leaders are bracing for a year of intensifying challenges. Regulations are tightening, nation-state attackers are refining their strategies, and CISOs are under growing pressure. Aleksandr Yampolskiy, Co-Founder and CEO, Jeff Le, VP of Global Government Affairs and Public Policy, and Steve Cobb, CISO, all from SecurityScorecard, bring sharp focus to what lies ahead. What worked in 2024 may not protect you in 2025.

Do You Need IDS and IPS?

Imagine, for a moment, that your IT environment is the Death Star. You know the rebels will try to rescue Princess Leia. If you’re Darth Vader, you need systems that detect Luke and Chewbacca when they gain unauthorized access and systems that prevent them from accessing the Death Star. As a security analyst, you have varied technologies that detect and prevent malicious actors from gaining unauthorized access to your networks.

The evolution of vulnerability scanning

As application development and deployment evolve, traditional tools alone can no longer handle the dynamic, ephemeral nature of cloud and cloud-native environments. This article explores how cloud-native application protection platforms (CNAPPs) are addressing these challenges to enhance coverage and streamline prioritization.