Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

LOLBins: executing payloads through DNS records

In this blog post, we outline the research our Threat Intelligence team has undertaken into this new attack vector. A new LOLBins tactic for executing payloads through PowerShell was released by Alh4zr3d, a security researcher, on Twitter in September 2022. In the tweet, the security researcher recommended that organisations stay away from IEX and Invoke-WebRequest when using PowerShell commands and, as a substitute, host a text record with their payload on a domain.

Why Data Loss Prevention strategy is core to successful M&A

When two companies merge, there is typically a lot of data that needs to be transferred between the two organizations. This data may include confidential information such as customer records, financial reports, and employee data. If this data falls into the wrong hands, it could be used to commit fraud or theft. That’s where data loss prevention (DLP) comes in.

September Product Rollup: Link Upgrades, Issue Resolution and More

This month, we’re excited to announce further improvements to public and private links, security and governance issue resolution, content lifecycle management support for content in Microsoft SharePoint and OneDrive, support for viewer-only permissions in the Egnyte mobile app, and more. Check out some of our product releases this month below.

Snyk and HashiCorp: The Snyk IaC Integration With HashiCorp Terraform Cloud and Terraform Enterprise

In this video, learn about the Snyk IaC integration with HashiCorp Terraform Cloud and Terraform Enterprise, which enable developers to automate security checks and ensure public cloud environments are secure and compliant pre-deployment — directly in their Terraform Cloud pipelines.

How to Create an Incident Response Plan

An incident response plan helps protect your business, customers, and finances in the event of a cybersecurity incident, or any kind of business disruption. It’s essential for business recovery and continuity as advanced and unknown cyber threats continue to gain ground. Most companies don’t yet have an incident response plan. Only 19% of UK businesses have a formalized response plan, while just 46% of US businesses have a specific response plan for at least one major type of cyberattack.

Phony PyPi package imitates known developer

Snyk Security Researchers have been using dynamic analysis techniques to unravel the behaviors of obfuscated malicious packages. A recent interesting finding in the Python Package Index (PyPi) attempted to imitate a known open source developer through identity spoofing. Upon further analysis, the team uncovered that the package, raw-tool, was attempting to hide malicious behavior using base64 encoding, reaching out to malicious servers, and executing obfuscated code.

WatchGuard Recognized at the 2022 TrustRadius Tech Cares Awards

We’re thrilled to share that, for the third year in a row, WatchGuard has been recognized in the 2022 TrustRadius Tech Cares Awards! This exclusive awards program honors companies that demonstrate compassion in every aspect of their organization and celebrates the best parts of the tech market and those working in the industry.

CISA orders federal agencies to catalog their networks, and scan for bugs

You always want to know what is attached to your network. And whether it could be vulnerable or not. In any organisation it’s normal for different devices, on- or off-prem, wired or wireless, to be constantly added or removed – and this can present an opportunity for malicious hackers to take advantage of improperly secured systems. In many cases, organizations have no idea about how many assets they have, let alone where they are all located.