Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

"I learned to build shorter, more efficient workflows": users reflect on our advanced certification

Earlier this year, we introduced the advanced certification within Tines University, a new way for our users to deepen their understanding of the platform and build more effective workflows. And I’m thrilled to report that user feedback has been overwhelmingly positive. Over 100 users have already completed the new advanced certification, raising the total number of Tines-certified users to over 500.

SecurityScorecard is now part of AWS OMNIA

SecurityScorecard is excited to announce that we are now an AWS OMNIA partner. This unlocks a critical opportunity for the 90,000 buying organizations that make up the OMNIA partner network to reduce and manage Supply Chain Cyber Risks. The third party attack surface is a fast growing risk vector and SecurityScorecard offers an industry leading solution to help organizations combat these threats.

FBI and International Partners Dismantle Dispossessor Ransomware Operation

In a major breakthrough against cybercrime, the FBI, in collaboration with international partners, successfully disrupted the Dispossessor ransomware operation, seizing its servers and websites. This operation, which involved agencies from the United States, the United Kingdom, and Germany, marks a significant step forward in the global fight against ransomware.

CCRI renamed Cyber Operational Readiness Assessment (CORA)

The Command Cyber Readiness Inspection(CCRI) is a comprehensive cybersecurity evaluation and assessment conducted by the United States Department of Defense (DoD). A CCRI serves as a formal inspection aimed at enhancing accountability and bolstering the security posture of DoD Information Networks in alignment with DoD standards, with a specific focus on Command, Mission, Threat, and Vulnerability.

How to connect a WebDAV server to Internxt Drive

This short tutorial shows you how to use WebDAV by connecting to a WebDAV server to upload your Internxt Drive files via the Internxt CLI, ensuring your files are securely transferred and accessible. Once you have downloaded the Internxt CLI, you can connect and interact with your Internxt cloud storage via your preferred WebDAV server, we support: CyberDuck, Transmit, Cadaver, or Finder.

Ransomware Kingpin Who Called Himself "J P Morgan" Extradited to the United States

An investigation dating back almost ten years has seen the extradition this week to the United States of a man suspected to be the head of one the world's most prolific Russian-speaking cybercriminal gangs. The UK's National Crime Agency (NCA) says it has been investigating a cybercriminal using the online handle "J P Morgan" since 2015, alongside parallel investigations run by the United States FBI and Secret Service.

Unifying Security Across Environments with Calico

As companies build more cloud-native apps, securing them across different infrastructures becomes a challenge. Cloud-native apps leveraging different deployment environments such as on-premises, public cloud, or hybrid have different security challenges as they are scaling, interoperable, and cost-effective.

Enhanced Compliance Monitoring with NIST 800-53 Integration

Illuminate 5.1.0 is now available, bringing substantial improvements to our compliance capabilities. This update represents a significant step forward, with NIST 800-53 as the cornerstone of our compliance framework. Let’s explore the key features and improvements implemented to support your organization’s security and compliance needs. Important Note: To run Illuminate 5.1.0, your environment must run Graylog 6.0 or higher.

Vulnerabilities in NodeJS C/C++ add-on extensions

One of the main goals of this research was to explore C/C++ vulnerabilities in the context of NodeJS npm packages. The focus will be on exploring and identifying classic vulnerabilities like Buffer Overflow, Denial of Service (process crash, unchecked types), and Memory Leakages in the context of NodeJS C/C++ addons and modeling relevant sources, sinks, and sanitizers using Snyk Code (see Snyk brings developer-first AppSec approach to C/C++).