Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Notable zero-day vulnerability trends in 2024: Insights and implications

2024 has seen a significant uptick in the discovery and exploitation of zero-day vulnerabilities. These unpatched security flaws present a serious challenge to cybersecurity teams, as attackers can exploit them before any patches are available. As a result, zero-day vulnerabilities have become a go-to tool for cybercriminals aiming to infiltrate enterprise networks.

Unlocking the power of Amazon VPC: Transforming security and efficiency across sectors

The rise in cyberattacks has become a pressing concern for organizations worldwide, threatening sensitive data, operational continuity, and trust. Cybercriminals are using increasingly complex strategies to attack vulnerabilities in systems and networks in a variety of organizations. By offering safe, segregated virtual networks in the cloud, Amazon Virtual Private Cloud (Amazon VPC) provides a strong defense against these attacks.

Understanding Indicators of Compromise and Their Role in Cybersecurity

Through a known vulnerability, a threat actor gains access to an organization and begins to alter the network activity, running unusual enumeration commands. Then the threat actor uses stolen credentials to log into various applications within said network. The cybersecurity monitoring solution at work, in this case Arctic Wolf Managed Detection and Response, subsequently picks up an IP address associated with Finland connecting to the network.

The Future of Cybersecurity: Insights and Predictions for 2025

2024 marked a transformative shift in cybersecurity with AI and data driven cyber security leading the change. As the threat landscape evolves, the stage is set for further advancements in continuous risk management, threat monitoring, resilience, and governance in 2025, shaping a more secure and dynamic digital landscape where cybersecurity is becoming a catalyst for business success and compliance.

How to build a cyber risk program that will lock hackers out

Rob Kraczek, One Identity Global Strategist, explores how organizations can avoid becoming part of the 90% of organizations that are victims of cyberattacks by developing a cyber risk program. Most hackers look for the easiest and most effective way to hack your environment. In this video, Kraczek shares why every organization needs robust identity governance and administration (IGA), the core component of a cyber risk program, to prevent cyberattacks. Learn more about Risk in the World of Identity Governance.

Web Application Security for DevOps: Cross-Origin Resource Sharing (CORS) and Subresource Integrity (SRI)

With all of that background from parts 1, 2, and 3 of this series out of the way, let's turn to some practical considerations for real-world web applications. The inherent security restrictions for resources, including cookies and JavaScript, assume that each website contains all of its functionality in one neat, isolated package. But websites often contain content and functionality from multiple websites that trust each other.

WatchGuard Acquires ActZero to Accelerate Delivery of 24/7 MDR Services

WatchGuard acquired ActZero, a leading provider of MDR services with proactive, rapid and automated threat response and cross-platform AI-driven threat analysis designed to outpace threats at machine speed. This move further expands and matures WatchGuard’s innovative 24/7 MDR service and was signed and closed on December 17, 2024.

Emerging Threat: Windows LDAP CVE-2024-49113

CVE-2024-49113, also known as LDAPNightmare, is a high severity (CVSS score of 7.5) unauthenticated Denial of Service (DoS) vulnerability in Windows Lightweight Directory Access Protocol (LDAP). This vulnerability allows attackers to crash any unpatched Windows server with an internet-accessible DNS server by overwhelming a critical internal component of the operating system. Both CVE-2024-49113 and its relative, the critical RCE vulnerability CVE-2024-49112, were publicized in December 2024.