Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Introducing Mend Supply Chain Defender Integration with JFrog Artifactory

When it comes to understanding the difference between open source software vulnerabilities and malicious threats, it’s helpful to think in terms of passive vs. active threats. Vulnerabilities can be attacked and exploited, but in a vacuum don’t pose a threat. Malicious threats are different —– they involve a threat actor actively planning to attack you.

Amazon RDS Just-in-Time (JIT) Access With Teleport and Slack

This blog is part three in a series about secure access to Amazon RDS. In Part 1, we covered how to use OSS Teleport as an identity-aware access proxy to access Amazon RDS instances running in private subnets. Part 2 explained implementing single sign-on (SSO) for Amazon RDS access using Okta and Teleport. In Part 3, we will guide you through the steps to configure privilege escalation for just-in-time access requests for Amazon RDS access.

CVE-2022-26134 - Critical Vulnerability in Confluence Server & Data Center

On Tuesday, May 31, 2022, Volexity responsibly disclosed a remote code execution (RCE) vulnerability to Atlassian affecting all supported versions of Confluence Server & Data Center. The Object-Graph Navigation Language (OGNL) injection vulnerability allows an unauthenticated user to execute arbitrary code on a Confluence Server or Data Center instance.

We've joined the FIDO Alliance to build a better future for authentication

I’m happy to announce that 1Password has joined the FIDO Alliance to help build safer, simpler, and faster login solutions for everyone. In fact, we’re already on our way … keep reading for a sneak peek at the future of authentication in 1Password.

Detecting and mitigating CVE-2022-26134: Zero day at Atlassian Confluence

A new zero day vulnerability actively exploited in the wild has been found in Atlassian Confluence. The vulnerability CVE-2022-26134 affects all supported versions of Confluence Server and Confluence Data Center allowing an unauthenticated user to run arbitrary commands remotely. The Atlassian team confirmed the vulnerability with an official tweet and then also published a security advisory to update its customers.

Raising SIEM awareness and securing enterprise endpoints with Joseph Steinberg

In this episode of ManageEngine Insights podcast, we'll explore various security concerns arising in enterprises and elsewhere. Enterprises need to consider both bottom-up and top-down approaches, as well as a wide variety of hardware and software-based security measures.

PCI DSS 4 0 Requirements Explained

PCI DSS 4.0 update has made a huge buzz in the industry post its release. Organizations are still scrambling to understand the changes introduced and learn about the requirements of PCI DSS. So, explaining the updates and the PCI requirements in detail VISTA InfoSec conducted an informative webinar on ”PCI DSS 4.0 Requirements Explained”. Watch the video and gain insight into the key updates introduced by the PCI Council.

Microsoft zero-day vulnerability, Follina (CVE-2022-30190), exploited in the wild: Here's all you need to know

Follina—while we’re sure this commune in Italy is lovely, the same can’t be said about this new vulnerability by the same name for InfoSec folks. Thanks to a zero-day bug in the Microsoft Support Diagnostic Tool, Follina is now making the headlines but for all the wrong reasons. This blog talks in detail about the zero-day vulnerability in Microsoft Support Diagnostic Tool (MSDT), popularly known as Follina.