Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CVE-2024-6387: Critical Remote Code Execution Vulnerability in OpenSSH

On July 1, 2024, OpenSSH released fixes for CVE-2024-6387, a vulnerability in OpenSSH’s server (sshd) on glibc-based Linux systems allowing for potential Remote Code Execution (RCE). OpenSSH is a widely-used suite of secure networking tools based on the SSH protocol, providing encryption for secure communication and file transfers, and is essential for remote management on Unix systems. CVE-2024-6387 is a signal handler race condition that allows unauthenticated Remote Code Execution (RCE) as root.

How to Navigate Data Security in the GenAI Era

Since its mainstream emergence in 2022, generative AI has triggered a seismic shift in data management and security. It is estimated that one in four employees now uses genAI apps daily, often unbeknownst to their employer and IT team. This raises concerns, as genAI is designed with a voracious appetite for consuming both mundane and sensitive data. Effectively securing your data as genAI becomes prevalent is a strategic imperative.

Exploring generative AI guardrails: The Tines approach

Innovation rarely starts with acknowledging the restrictions. It’s only after you’ve fleshed out the practical concepts that you begin to understand how they can align with the predefined boundaries, ensuring that your final product is both useful and compliant. This dynamic process encourages a more organic pathway to discovery, leading to solutions that are not only innovative but also viable within the given constraints.

Clockwork Blue: Automating Security Defenses with SOAR and AI

It’s impractical to operate security operations alone, using manual human processes. Finding opportunities to automate SecOps is an underlying foundation of Zero Trust and an essential architecture component for enterprise-scale SOCs. Let’s discuss what SOAR is, its common uses, and the future of SOAR with AI.

Arizona Department of Homeland Security enhances cybersecurity with Elastic's AI-driven security analytics

The Arizona Department of Homeland Security (AZDOHS) operates in an environment that requires a robust cybersecurity strategy to protect against ever-evolving threats. With a mission to safeguard state and local infrastructures, the team at AZDOHS faced the daunting task of monitoring an expansive array of data points and potential vulnerabilities.

Configuring Samba | JumpCloud University Tutorial (2024)

In this tutorial, we'll cover JumpCloud Samba configurations and pair with Cloud LDAP. Enabling Samba support allows for LDAP users to authenticate to end points that require Samba attributes within the LDAP directory. To discover more resources checkout JumpCloud University where you’ll find courses, tutorial videos, engaging guided simulations, and end user content.