Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Amazon EC2 Instance Metadata Targeted via Server-Side Request Forgery (SSRF)

CVE Trends, Vulnerabilities of SSRF On March 25, 2024, the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) issued a joint cybersecurity advisory about an increasing yet commonly overlooked web application vulnerability, Server-Side Request Forgery (SSRF).

Warning: QuickBooks Phishing Campaign Targets Taxpayers

Cybercriminals are capitalizing on tax season by launching phishing campaigns targeting QuickBooks users, Malwarebytes reports. The attack begins with a malicious Google ad that appears at the top of the page when a user searches for QuickBooks. The website’s domain, “quicckboorks-acccountingcom,” is designed to trick users who don’t closely examine the URL.

Why That Email Smells Fishy (Phishing Explained Fast)

Ever get an email that seemed… fishy? That ‘Urgent’ Email? Yeah, It’s a Trap. In just 30 seconds, we break down what phishing is, how it works, and how to spot it before it’s too late. Don’t take the bait—stay sharp online. Netwrix helps organizations spot threats like phishing "BEFORE" damage is done.

How to Make Website Australian Privacy Principles Compliant

Websites that handle personal data from Australian residents must comply with the Australian Privacy Principles (APPs) under the Privacy Act 1988. The Office of the Australian Information Commissioner (OAIC) enforces these laws, and non-compliance can result in legal penalties and reputational harm. Many businesses operating in Australia are caught unprepared when it comes to OAIC compliance requirements.

Europe's Energy Sector at Risk: The Critical Need for Cybersecurity

Reliable energy is the backbone of any modern society. It powers our homes, industries, and economies. But what happens when this essential infrastructure becomes a target for cyberattacks? In Europe, the energy sector is facing an escalating threat landscape, with potentially dire consequences.

How to Vet SaaS Apps Using FedRAMP Equivalency

As much as some people dislike it, the world is interconnected, and to operate a business successfully, you will have to use the products or services produced by other businesses. Under normal circumstances, this is fine. However, when you’re a contractor looking to work with a department of the federal government, you have to adhere to higher standards.

Enhanced Email Incident Alerting Controls from GitGuardian

GitGuardian is helping reams respond to and remediate incidents more efficiently than ever, thanks to our new Enhanced email incident alerting controls. While you can configure GitGuardian alerts to integrate with servies like Slack, Teams, PagerDuty, and any other system that can work with JSON and webhooks, Email notifications are still the default way we send alerts.

Introducing GitGuardian Custom Tags, Making Filtering and Sorting Incidents and Honeytokens Easier

GitGuardian has introduced custom tags, empowering teams to manage and prioritize secrets incidents and Honeytokens better than ever. GitGuardian has always automatically applied certain predefined tags to help teams identify incidents where, for example, a secret was found in a Default branch, is in a sensitive file, or discovered from a historical scan, just to name a few options.

Illuminate and Defend: Uncovering the Shadows of Your Network

In a vast network filled with legacy systems, unmanaged devices, and hidden threats, visibility is the key to protection. This video explores the importance of understanding and securing every corner of your network—whether it's IT, IoT, OT, or IoMT. With the Forescout 4D Platform, you can illuminate the unseen and gain control over even the most elusive assets to mitigate risks and defend against emerging threats.