Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SecOps

What is a Spoofing Attack and How Can You Prevent Them?

At the heart of almost every business interaction lies trust. Whether logging in to a website, providing information over the phone, or interacting via email, trust is essential when the communication involves money, sensitive data, or both. To win a victim’s trust, gain access to a secure system, receive sensitive data, or insert malicious software, cybercriminals use various tools and tactics to mask their identity or disguise their devices. These tactics are the foundation of a spoofing attack.

How Hacking Has Evolved Over Time

The only constant you can count on in technology is change. From microprocessors to PCs to smartphones to software, technology continues to become faster, smarter, and more sophisticated. But make no mistake: what’s changed the most in the world of technology over the past few decades is the hacker. Hackers are highly motivated to stay ahead of the latest security trends. It’s how they keep from getting caught, and how they keep the fun and profit rolling.

Why Templates Deliver Critical Best Practice Workflows For Maximizing Enterprise Security

It’s difficult for even the most advanced security teams to stay on top of evolving incursions and ensure their processes effectively map to prevent them. That’s where pre-built templates come into the conversation. No-code, security automation templates can handle the considerable burden of having to maintain and update processes that integrate with a company’s security stack.

The Top 3 Cybersecurity Threats and How to Overcome Them

The business world is changing fast. The shift to hybrid or remote models and the rapid adoption of cloud services are allowing employees to work from anywhere, while giving the companies they work for the chance to increase innovation and stay ahead of their competition. The cybersecurity industry has changed as well, with those same innovations creating new challenges for IT and security teams.

CVE-2022-20842 & CVE-2022-20827 - Critical Vulnerabilities in Cisco Small Business Routers

On Wednesday, August 3, 2022, Cisco disclosed two critical-severity vulnerabilities (CVE-2022-20842 and CVE-2022-20827) impacting RV160, RV260, RV340, and RV345 series small business routers. Both vulnerabilities are due to insufficient validation but differ in how they are exploited.

Arctic Wolf Hailed as a Leader for Innovation, Culture and Business Growth by Prestigious National Awards

Exciting times are here at Arctic Wolf. This week, we celebrated a pair of awards recognizing our status as an industry innovator and employer of choice, with rankings on both the Forbes Cloud 100 and Fortune Best Medium Workplaces list.

CVE-2022-31656 - Critical Authentication Bypass Vulnerability in Multiple VMware Products

On Tuesday, August 2, 2022, VMware disclosed a critical-severity authentication bypass vulnerability (CVE-2022-31656) impacting multiple VMware products, including VMware’s Workspace ONE Access, Identity Manager (vIDM), and vRealize automation. If successfully exploited, the vulnerability could allow a threat actor with network access to the user interface to obtain administrative access without needing to authenticate.
Sponsored Post

An Introduction to Automation Basics

Automation is a powerful tool. With some foresight and a little elbow grease, you can save hours, days, or even months of work by strategically automating repetitive tasks. What makes automation particularly beneficial is that it eliminates manual interaction with multiple systems. Rather than manually uploading data to an event response system or notifying key support personnel of an incident, tying these tasks together through automation can reduce critical time and help resolve problems faster and more efficiently. But, before we can fill in the gaps between all of the platforms we are responsible for, we first need to understand how data moves around on the web and how we can use that process to our advantage.

The Top Cyber Attacks of July 2022

It was an exceptionally hot July in many parts of the world, and cyberspace was no exception. High profile hacks in July affected people in all walks of life, from casual gamers and social media posters to air travelers and medical patients. Still, we hate to be the bearers of exclusively bad news, so we’ve included one silver lining amongst our usual bank of dark clouds.

3 Big Takeaways From the Verizon DBIR 2022

The data in the new Verizon “Data Breach Investigations Report” (DBIR) offers critical insights into the current state of cybersecurity. After a year of data breaches and cyberattacks consistently dominating headlines, this year’s report closely examines what adversaries are looking for when they’re trying to infiltrate businesses and organizations.