Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Shell Oil Company the Latest Hit By MOVEit Data Breach

Shell is one of the largest oil and gas companies in the world today. The organization is based in London, England, and has branches in many countries throughout the world, including the United States. Shell has an estimated annual revenue of $381.3 billion USD and employs approximately 86,000 people. The company was recently added to the list of victims of the large-scale MOVEit data breach. Details are still fuzzy, but it appears that many individuals could be compromised.

Weekly Cybersecurity Recap July 14

Healthcare companies and insurance providers were hard hit this week in a slew of data breaches. Some of the breaches happened long ago, while others are fresh, but either way, it's clear that medical companies are being targeted heavily by hackers. The list of companies includes the Charles George VA Medical Center, ARx Patient Solutions, Advanced Medical Management, and Imagine360 LLC. We also can't skip over the fact that oil giant Shell was hit by a breach as well.

Analysis of CVE-2023-2868 Exploitation: Campaign Targeting U.S. Entities Using Barracuda Email Security Gateway

CVE-2023-2868, a vulnerability in the Barracuda ESG was announced on May 23. On June 15th, a report surfaced, attributing the exploitation of this vulnerability to a threat actor group tracked as UNC4841, which analysts believe is conducting espionage on behalf of the Chinese government. SecurityScorecard’s STRIKE Team consulted its datasets to identify possibly affected organizations.

Top 5 security concerns for infrastructure as code

Infrastructure as code (IaC) has changed how we deploy and manage our cloud infrastructure. Instead of having to manually configure servers and networks with a large operations team, we can now define our service architecture through code. IaC allows us to automate infrastructure deployment, scale our entire fleet of servers, document a history of changes to our architecture, and test incremental changes to the network.

The Rising Threat of Cyber Warfare: Protecting Nations and Private Companies

Join us as we delve into the alarming reality of the Cyber Wolf, an ongoing phenomenon that extends far beyond the conflict in Ukraine. From nation-state actors to various global players, we are witnessing a significant increase in cyber warfare-related attacks and tests worldwide. In this gripping discussion, we explore the pressing question: it's not a matter of if, but when will this happen to us?

Octiga's New M365 Conditional Access Policy Baselines and Migration Process| Latest Release!

Hey there! In this video, I wanted to update you on the latest release from Octiga. We have introduced new conditional access policy baselines that offer more control over user inclusions, group and role inclusions/exclusions, and the ability to set a generalized template for conditional access policies.

Code Intelligence Finds New Vulnerability in protobufjs: CVE-2023-36665

As part of Code Intelligence's ongoing efforts to improve the security of open-source software it continuously tests open-source projects with its JavaScript fuzzing engine, Jazzer.js, in Google's OSS-Fuzz. Recently Code Intelligence uncovered a new Prototype Pollution vulnerability in protobufjs (CVE-2023-36665) using its newly integrated Prototype Pollution bug detector. The vulnerability puts affected applications at risks of remote code execution and denial of service attacks.

Top Tips: How hackers use emojis to infect your devices

Emojis are now the widely understood language of our digital world.These tiny icons that add color and life to our messages are designed to enhance online interactions by letting us express emotions and thoughts in an easy way. But hackers are seeing them as an opportunity to infect devices and exploit our personal data.

Understanding Amazon Security Lake: Enhancing Data Security in the Cloud

This year, Amazon Web Services (AWS), a leading cloud services provider, announced a comprehensive security solution called Amazon Security Lake. In this blog post, we will explore what Amazon Security Lake is, how it works, the benefits for organizations, and partners you can leverage alongside it to enhance security analytics and quickly respond to security events. Image source: Amazon.