Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Secrets in Plain Sight: Unveiling over 1 million secrets on public websites

Join us at CodeSecDays for an insightful session with Cybernews researcher Vincentas Baubonis, who will reveal how their team discovered 1,141,004 secrets across 58,364 websites. Learn how exposed environment (.env) files containing passwords, API keys, and email credentials can lead to data breaches and site takeovers. We’ll discuss common leaked secrets like database credentials and AWS keys, and their impact, and share research methodology, ethical considerations, and steps to prevent exposure.

OpenStack vs. Kubernetes: Building Resilient Cloud Infrastructure

In cloud computing, two platforms stand out: OpenStack and Kubernetes. OpenStack, an infrastructure-as-a-service (IaaS) platform, enables the creation and management of virtualized data centers that cater to diverse workloads. Kubernetes, a container orchestration platform, excels at managing large-scale, distributed applications, facilitating rapid deployment and scaling. The OpenStack vs.

Navigating the Cybersecurity Landscape: A Deep Dive into Effective SIEM Strategies

Comprehending and effectively addressing cybersecurity threats is paramount to organizational security. As artificial intelligence continues to evolve, how companies respond to cybersecurity threats and how they take proactive steps to mitigate them will factor heavily into profitability, reputation and long-term success.

Friedemann Kurz reacts to Cato's latest SASE video

We put Friedemann Kurz, Head of IT Porsche Motorsport, in the hot seat! From securing high-speed data to celebrating victories, he reveals it all while watching our newest video with the TAG Heuer Porsche Formula E Team. Catch his reactions and insights on why network security is crucial for reaching the podium. Let’s connect.

Rule tuning - supercharge Cloud SIEM for better alerts

We’ve seen the movies where the character needs to get out of a jam or needs to get somewhere in a hurry, so they mash the big button of Nitrous Oxide and boom they are off! Fast and the Furious and Boss Level are the two movies that come to mind. So, how does this relate to a SIEM or SIEM rules? Sit down, buckle up, and let’s go for a ride.

Microsoft Warns Customers of Email Breach by Russian Hackers

In a recent security disclosure, Microsoft has warned more of its clients that Russian hackers have accessed emails exchanged between them and the company. This breach, attributed to the notorious "Midnight Blizzard" hacking group, has raised significant concerns about the security of communications with Microsoft.

CVE-2024-3937: Maximum Severity Authentication Bypass Vulnerability in Juniper Routers

On June 28, 2024, Juniper released fixes for a critical authentication bypass vulnerability discovered during internal testing, CVE-2024-3937. Juniper has stated that this vulnerability affects only Session Smart Router (SSR), Session Smart Conductor, and WAN Assurance Router products running in high-availability redundant configurations.

regreSSHion: Uncovering CVE-2024-6387 in OpenSSH - A Critical Vulnerability

OpenSSH, an application installed by default on nearly every Unix-like and Linux system, has recently come under scrutiny due to a critical vulnerability discovered by Qualys. Designated as CVE-2024-6387 and aptly named "regreSSHion," this flaw exposes Linux environments to remote unauthenticated code execution. The implications of this vulnerability are far-reaching, potentially affecting countless servers and infrastructure components across the globe.