Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Securing Docker Containers Against Commando Cat Attacks: Best Practices for Enhanced Cybersecurity

Cybersecurity researchers have uncovered a malicious Python package in the Python Package Index (PyPI) repository designed to distribute an information stealer known as Lumma (aka LummaC2). The counterfeit package, crytic-compilers, mimics the legitimate crytic-compile library through typosquatting tactics. Before its removal by PyPI maintainers, the counterfeit package was downloaded 441 times. Impersonation and Deception Tactics.

CrowdStrike Sets Speed Benchmark with Fastest-Ever Threat Detection in MITRE Engenuity ATT&CK Evaluations: Managed Services, Round 2

Security teams must outpace increasingly fast and sophisticated adversaries to stay ahead. In the most recent closed-book MITRE Engenuity ATT&CK Evaluations: Managed Services, the CrowdStrike Falcon platform once again demonstrated it stands alone in its ability to deliver the speed and efficacy needed to stop breaches.

SSDF BSIMM mapping updated for BSIMM14

In early March 2024, the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) released its final Secure Software Development Attestation Form instructions, sparking a renewed urgency around understanding and complying with 31 of the 42 tasks in NIST SP 800-218 Secure Software Development Framework (SSDF) version 1.1.

Random but Memorable - Episode 13.0: Lift As You Climb with Adamaka Ajaelo from Self-eSTEM

How can we foster diversity and champion inclusivity in the cybersecurity industry? And how do we support and encourage more BIPOC women and girls to get into tech? Our final episode of the season invites Self-eSTEM founder, Adamaka Ajaelo, to have this important and inspiring conversation with 1Password Founder Sara Teare. We also dissect what looks to be turning into one of the largest data breaches ever, in Watchtower Weekly. Plus, we go out with a bang in our final game of Security Blank.

Deciphering the SIEM Puzzle

The 2024 Gartner Magic Quadrant for SIEM is here, jam-packed with 21 vendors. To add to the mix, recent mergers and acquisitions are stirring up the market. It’s no wonder security professionals are questioning their current SIEM’s future roadmap. But don’t worry—navigating this complex landscape doesn’t have to be overwhelming. We are here to help.

Unify Identity Security with Microsoft E5 and CyberArk

In today’s dynamic threat landscape, a robust identity security strategy is paramount to protecting enterprises. With the digital perimeter extended to every user identity, securing access across your complete environment – on-premises, multi-cloud and everything in between – is no longer optional, but essential.

New Kroll report reveals evolving use of insider threat and phishing techniques

In Q1 2024, Kroll observed SMS and voice-based tactics being used in phishing attacks, raising concern around the potential for deep fakes and AI technologies to further enhance the effectiveness of phishing attacks. Linked to this, one insider threat case investigated by Kroll in Q1 saw employee impersonation take place, another area in which AI-related technology could be especially impactful.

Passkeys vs Two-Factor Authentication (2FA): What's the Difference?

The main difference between passkeys and 2FA is that passkeys completely remove the need for individuals to enter a password, whereas 2FA enhances the security of an account by requiring an additional method of authentication in addition to a traditional username and password. Continue reading to learn more about the differences and similarities between passkeys and 2FA, and which is more secure.

The Vital Role of Car Accident Lawyers

The situation in the wake of a car crash is overwhelming and disorienting. The shock of the accident and possible injuries, coupled with the labyrinthine nature of insurance claims, blankets the entirety of the situation in bleakness. However, this is where lawyers specializing in car accidents make their grand entrance. Their help is beyond valuable, working to ensure that victims are rightly served with justice and due compensation.

Black Box Security Testing - Process, Types and Techniques

With cybercrime costs projected to hit $10.5 trillion by 2025, securing digital assets is more critical than ever. Black box testing in security has become a key strategy for organizations to identify vulnerabilities in software and systems proactively. This blog delves into the essential role of black box security testing in mitigating risks along with its various types and techniques.