Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Navigating Regulatory Standards in Non-Banking Financial Companies

Navigating the regulatory standards within Non-Banking Financial Companies (NBFCs) demands a nuanced understanding of the evolving landscape shaped by the Reserve Bank of India (RBI) and other regulatory bodies. These standards serve as pillars for upholding the stability and transparency of the financial industry. Over recent years, this sector has witnessed a transformative journey in regulatory frameworks, reflecting the dynamic nature of finance.

Audit Kernel Object

The Audit Kernel Object feature dictates whether the operating system records audit events when users try to access the system kernel, encompassing mutexes and semaphores. Security audit events are generated exclusively for kernel objects with a corresponding System Access Control List (SACL). Typically kernel objects are only given SACLs if the AuditBaseObjects or AuditBaseDirectories auditing options are enabled.

Proactive Vulnerability Management is a No Brainer for Security, but...

In December 2022, the US Cybersecurity and Infrastructure Security Agency (CISA) identified exploits against vulnerable public-facing applications as the most common initial attack vector for cybercriminals, followed by attacks on external remote services such as VPNs. According to a study by CrowdStrike, exploit activity targeting cloud apps and assets grew 95% from 2021 to 2022, and instances of threat actors directly targeting cloud apps exploded by 288% during that period.

Don't get hacked! Apply the right vulnerability metrics to Kubernetes scans

This is not a beginner’s blog post. As such, we will not tell you about the importance of securing your Kubernetes infrastructure (it’s important). However, if you are here to learn about increasing the efficiency of your security work and the blind spots you may have, you have come to the right place. You may have heard of and are already using CVSS as your gold standard for vulnerability prioritization.

Application Security Challenges and Trends for the Year 2024

Every year, new technologies are released; with them, professionals are discovering new sets of application vulnerabilities. However, some threats and challenges are constant in the list, such as malware and app spoofing. However, all the threats are now more powerful with the advancement of tools. Further, it’s expected that the mobile app security challenges will be more rigid in 2024.