Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

June 2024

Revolutionizing cloud security: Panoptica's CIEM and the battle against identity threats

Imagine a scenario where an attacker, unnoticed, gains access to your cloud infrastructure, manipulating identities and permissions to steal sensitive data or disrupt operations. In the rapidly evolving world of cloud computing, managing and securing cloud identities has become more critical than ever. Identity-based threats are growing exponentially, and traditional security measures are no longer sufficient.

Webinar Replay: Q1 2024 Threat Landscape: Insider Threat & Phishing Evolve Under AI Auspices

In the first quarter of 2024 Kroll saw an evolution in techniques used by attackers, some of which may point to longer term trends in the variation and sophistication of attacks faced by organizations. In this briefing, Kroll’s cyber threat intelligence leaders explore key insights and trends from hundreds of cyber incidents handled worldwide in Q1.

The Stuxnet Lesson: Trust and Deception in Cybersecurity | Razorthorn Security

Robert Black recounts the famous Stuxnet attack on Iranian nuclear facilities, highlighting the role of deception. By making systems appear normal to attackers, significant damage was done without immediate detection. Understand the power of trust and deception in cybersecurity defense strategies.

AI Integration: Empowering Your Team for the Future | Brivo Insights

Dive into the world of AI with Brivo! In this essential guide, we're exploring how to seamlessly prepare your staff for the AI revolution. With technology rapidly evolving, ensuring your team is ready to embrace AI is crucial for staying ahead. From understanding AI basics to implementing practical training strategies, we cover it all. Plus, discover how Brivo's smart spaces technology can enhance this transition, making it smoother and more efficient.

Zero-Trust Application Service: Protect Against Unknown Threats

Are you struggling with unknown threats? Conventional security measures may not catch everything, leaving gaps for harmful applications. Discover how WatchGuard EDR’s Zero-Trust Application Service uses AI-powered threat detection to ensure every application on your system is classified for comprehensive protection. Take a proactive approach to your cybersecurity and keep your systems safe from unknown threats.

NYSE's #TakingStock: Arctic Wolf President & CEO Nick Schneider on the Centralized Platform

At #RSA24, Arctic Wolf CEO and President Nick Schneider sat down for a #TakingStock conversation with Trinity Chavez to share how Arctic Wolf's focus on delivering superior security outcomes has led to enhancements across our industry-leading security operations platform. #EndCyberRisk.

How GitGuardian Provides Peace of Mind for Kubefirst

In the world of software development, the security of your code is paramount. This is especially true for GitOps shops like Kubefirst, where secrets, tokens, and repositories are constantly being updated and shared. John Dietz, CEO and technical co-founder of Kubefirst, shared his experiences with GitGuardian and how it has become an essential tool in their operations.

Cybersecurity and Doughnuts: A Sweet Approach to Office Security

In the realm of office dynamics and cybersecurity, sometimes the simplest strategies are the most effective. One such strategy that has gained popularity here amongst our ranks is the penalty of buying doughnuts for the office whenever someone forgets to lock their computer when stepping away. This sweet approach not only keeps cybersecurity at the forefront of everyone’s mind but also fosters a sense of camaraderie and accountability.

CrowdStrike Wins Frost & Sullivan 2024 Cloud Leadership Award

Frost & Sullivan named CrowdStrike the winner of its 2024 Customer Value Leadership Award in the global cloud security industry, reinforcing our dominance in cloud security at a time when the practice has never been more critical for organizations worldwide. According to the CrowdStrike 2024 Global Threat Report, cloud intrusions grew 75% year-over-year in 2023, with adversaries becoming more focused and persistent in the cloud.

EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis

CrowdStrike is constantly researching, working and innovating to stay at the cutting edge of threat detection and response. Recently, these efforts include EMBERSim, a large-scale dataset developed to address limitations in binary code similarity (BCS), improve malware detection and facilitate future work in this area.

Active Exploitation Observed for Linux Kernel Privilege Escalation Vulnerability (CVE-2024-1086)

Last week, CISA added CVE-2024-1086 to its Known Exploited Vulnerability Catalog. CVE-2024-1086, a use-after-free vulnerability in the Linux kernel’s netfilter, was disclosed on January 31, 2024 and assigned a CVSS of 7.8 (High). If successfully exploited, it could allow threat actors to achieve local privilege escalation. While there was no evidence of active exploitation at the time of disclosure, we have since observed adversaries targeting CVE-2024-1086 in the wild.