Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Remote Desktop Protocol (RDP) Vulnerability

Remote Desktop Protocol (RDP) is a protocol developed by Microsoft, providing the user access to remotely connect with another computer. Microsoft’s remote desktop protocol is one of the best currently available in the market, working efficiently with an effortless graphical user interface (GUI). It can be used between multiple Windows Operating Systems and Devices. This article discussed RDP protocol security and current RDP vulnerabilities.

Tanium DEX Walkthrough - Digital Employee Experience - Tanium Tech Talks #110

See a full demo of Tanium's enhanced Digital Employee Experience. Tanium combines real-time monitoring, automated self-remediation, rapid incident investigation, and secure remote desktop capabilities to enhance IT efficiency and security and improve employee satisfaction. Integrate with ServiceNow to further enhance service desk efficiency.

Turbocharge Cybersecurity with Detection and Response

Ransomware is on the rise, cyber insurance is hard to get, and employees are still clicking on things that they shouldn’t. Even as criminals make use of automated tools to unlock threat vectors, new AI-based detection and response solutions enable advanced techniques to find and eliminate lurking threats and turbocharge cybersecurity. Join WatchGuard experts for an eye-opening session on how AI is transforming MSP businesses, so they increase security efficacy, build trust with clients, and grow with detection and response innovation.

DORA vs. NIS2 vs. PSD2: Navigating the Evolving Regulatory Landscape

The legal and regulatory landscape is constantly evolving, continually intensifying the demands placed on organizations. As well as meeting the requirements of existing regulations such as the Payment Services Directive 2 (PSD2), companies must contend with the upcoming introduction of the Network and Information Security Directive or NIS2 (Directive (EU) 2022/2555) and the Digital Operational Resilience Act (DORA).

CVE-2024-50388: Critical OS Command Injection Vulnerability in QNAP HBS 3 Hybrid Backup Sync

On October 29, 2024, QNAP issued a security advisory regarding a critical OS command injection vulnerability, tracked as CVE-2024-50388. Discovered by researchers at the Pwn2Own conference, this vulnerability affects HBS 3 Hybrid Backup Sync, a backup and disaster recovery solution used by organizations for secure data protection across multiple locations. The flaw allows remote attackers to execute arbitrary commands.

SAML vs OAuth Comparison: Similarities & Differences

SAML (Security Assertion Markup Language) and OAuth (Open Authorization) are two of the most common user authentication and authorization protocols. Both of them help manage identity and access using tokens, but they serve different purposes and operate in different contexts. This blog explains the key similarities and differences between SAML and OAuth and the specific use cases where they are most commonly employed.

What are Active Directory Service Accounts?

Just like human users, computer programs also need access to resources on a network to function properly. There’s a difference in how these two groups—individuals and programs—access these resources, though. While humans utilize user accounts, computer programs use Active Directory service accounts.

Healthcare, Finance, and Utility Security: Meeting Data Compliance Standards Across Industries

Organizations across different industries are subject to diverse regulatory compliance frameworks, each with stringent requirements. In the healthcare, finance, and utility sectors, these standards are particularly critical due to the high sensitivity of data and the potential consequences of breaches or non-compliance. Protegrity’s data compliance platform simplifies meeting regulatory requirements by employing encryption, tokenization, and data masking.

Best Static Analysis Tools for Mobile App Security

Before the introduction of static code analysis tools, securing mobile applications often felt like playing catch-up. Development teams would spend months building features, only to discover critical vulnerabilities late in the release cycle. This last-minute scramble to fix security issues delayed product launches and stretched resources thin—adding more pressure on developers and security teams.

QRishing Is Taking Phishing Offline: Here's How to Protect Customer Data

Imagine scanning a QR code to pay for parking or to buy a new jacket, only to realize you handed over credentials or card data to fraudsters. Yes – phishing is now also an offline phenomena, expanding its reach into real-world spaces via QR codes. Known as ‘QRishing’, this increasingly common attack exploits growing reliance on QR codes in both online and everyday physical environments, exploiting users’ lack of vigilance.