Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Practical Steps to Prevent SQL Injection Vulnerabilities

In today's digital landscape, web applications and APIs are constantly under threat from malicious actors looking to exploit vulnerabilities. A common and dangerous attack is a SQL injection. In this blog, we will explore SQL injection vulnerabilities and attacks, understand their severity levels, and provide practical steps to prevent them. By implementing these best practices, you can enhance the security of your web applications and APIs.

DataTrails - Chain of Custody for Nuclear Waste Disposal

This demo is an example of how DataTrails is used to collect information from different databases and different suppliers to form a single source of truth for the full life cycle of an asset. The video shows how multiple parties can track disposable containers for nuclear waste on the DataTrails transparent platform.

The 443 Podcast - Episode 281 - Locking Up LockBit

This week on the podcast, we cover an international law enforcement takedown of the LokBit ransomware group's infrastructure. After that, we cover a novel malware delivery vector involving an IoT "toy." We end the podcast by covering the latest White House Executive Order addressing cybersecurity in critical infrastructure. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Exploring the Complexity of Cyber Maturity Measurement Insights from the Two Types of Organizations

In this thought-provoking video, we tackle the formidable challenge of measuring cyber maturity within organizations. With a poignant quote attributing two types of organizations - those cognizant of their cyber breaches and those oblivious - we delve into the intricacies of this digital landscape. It's an exploration of the harsh reality that virtually every entity, particularly large enterprises, faces cyber threats, emphasizing the prevalence of intrusions even in seemingly secure networks. As we unravel the complexities of cyber resilience, we confront the sobering realization that insurance may not offer a panacea in safeguarding against cyber risks. Join us on this insightful journey as we navigate the turbulent waters of cybersecurity, offering insights and strategies for fortifying organizational defenses in an ever-evolving threat landscape.

Inside the Mind of a Cybersecurity Threat Hunter Part 2: Identifying Persistence Techniques

In this second post of our threat hunting with Corelight and CrowdStrike blog series we dive into Persistence, which is one the many tactical categories outlined in the MITRE ATT&CK framework. In our previous blog, we reviewed some of the common techniques in the Initial Access category, like Drive-By Compromise and Spearphishing. In this post, we examine and provide some useful threat hunting tips on some of the common tactics attackers use to maintain long-term access to a target's environment.