Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

June 2024

CVE-2024-3080: ASUS warns Customers about the latest Authentication Bypass Vulnerability detected Across seven Router Models

ASUS recently issued a firmware update to resolve a critical security vulnerability affecting seven different variants of its router models. Identified as CVE-2024-3080 with a CVSS v3 severity score of 9.8 (critical), the vulnerability permits remote attackers to take control of the affected router models without needing any login credentials.

How To Configure Secure Cloud Access with ServiceNow

Welcome to our comprehensive tutorial on configuring Secure Cloud Access Integration! In this step-by-step demo, we'll show you how to streamline your access request workflows with just-in-time privilege creation and policy management. Here's what you'll learn: How end users request access through the Secure Cloud Access interface. The process of sending these requests to Cloud Workspace Owners for approval. How ServiceNow displays and manages these access requests efficiently.

Deep Dive into Application Security: Understanding Firewalls, Malware, and APIs

In this week’s episode, we explore how Cloudflare handles application security, current trends, vulnerabilities, and future expectations. Host João Tomé is joined by Michael Tremante, Director of Product from our Application Security team. We discuss the evolution of application security and its increasing relevance today. We also go into specific use cases, covering firewall security, malware, supply chain risks, and the critical task of monitoring various vulnerabilities, including zero-day threats.

A Wake-Up Call for Endpoint Security: EPP in 2024

The Importance of EPP With cyber attacks continuing unabated, neglecting endpoint security is dangerous and potentially catastrophic. Organisations must adopt reliable endpoint security solutions to prevent threat actors from hijacking business systems or stealing sensitive data. Kaspersky The recent decision by the US government to ban the sales of Kaspersky antivirus software due to its ties to Russia underscores the importance of a trustworthy software supply chain.

Guarding the Classroom: Shielding Students from TikTok with Intelligence Powered Cybersecurity

The explosive growth of TikTok in schools isn’t just a trend—it’s a cybersecurity ticking time bomb. From rampant exposure to harmful content to severe data privacy concerns, TikTok’s unchecked influence poses significant threats to the safety and well-being of students, as well as compromising the technical infrastructure and sensitive data of schools.

Understanding TLPT: A Comprehensive Guide to Threat-Led Penetration Testing

Imagine your financial data behind a seemingly impenetrable wall, but in reality, it's akin to a fortress with invisible cracks. That is a world without Threat-Led Penetration Testing (TLPT). As cyber threats become more nuanced and lethal, TLPT stands as a specialised sentinel in the arsenal of financial institutions, safeguarding sensitive assets through the simulation of real-world attacks.

Fireblocks x Cosmos: Exploring THORChain

THORChain is a network that facilitates native asset settlement between various blockchains including Bitcoin, Ethereum, BNB Chain, Cosmos, and more. Overall, THORChain aims to provide a seamless and efficient way for users to exchange assets across different blockchains while maintaining a high level of decentralization, security, and community participation.

Believe the Hype: New Gartner Report Places Automated Incident Response on the "Slope of Enlightenment" and SOAR in the "Trough of Disillusionment"

Gartner just hammered another nail into the coffin of SOAR. The just-released “Gartner IT Service Management software (ITSM) Hype Cycle” report confirms SecOps professionals are profoundly unhappy with antiquated, legacy SOAR products and vendors.

5 Key Insights From a Modern CISO Panel

Devo recently brought together an esteemed panel of modern CISOs to discuss the issues that matter most to them and their peers. Included in the panel were: It was a lively discussion that covered important topics around the evolution of one of the top security executive roles. Here are five of the key takeaways that bubbled up from the hour-long CISO panel.