Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

June 2024

Penetration Testing of A.I. Models

Penetration testing is a cornerstone of any mature security program and is a mature and well understood practice supported by robust methodologies, tools, and frameworks. The tactical goals of these engagements typically revolve around identification and exploitation of vulnerabilities in technology, processes, and people to gain initial, elevated, and administrative access to the target environment.

What's at Stake if a Credit Union Is Breached?

The financial industry experienced the second-highest data breach cost in 2023, according to IBM. This includes breaches that affected credit unions as well as other financial institutions. But, despite costs, what else is at stake if a credit union is breached? If a credit union is breached, customer Personally Identifiable Information (PII) is at risk of being exposed and used for malicious purposes such as identity theft and fraud.

Looming Cyber Threats to Watch for Before the Paris 2024 Olympics

When it comes to the Olympic Games, the first thought on people’s minds is not usually about managing their cybersecurity. While the Olympics are home to the best of the best athletes, it is also home to trained cybercriminals who seek to profit off the large scale event for their own gain. With the Paris Olympics this summer congregating in over 16 cities in France, there is an abundance of opportunities for cybercrimes such as phishing scams and fake ticket sales to occur.

Directory Browsing IIS - keep it behind closed doors

A website directory, also known as a virtual directory functions similarly to a folder on a local machine, however, it exists on the web server’s file system and provides a structured and secure way to organize website content on an IIS server. Website directories act as logical containers for all the files that make up your website, including HTML pages, images, scripts, music, configuration files, and application binaries. Permissions assigned to directories control access to their contents.

Trustwave Unveils Six New Solutions to Unlock the Full Potential of Microsoft Security

Trustwave has launched six new Microsoft-focused offerings that will bring clients greater security, resilience, and a higher return on their investment by helping optimize their Microsoft 365 enterprise plan to take full advantage of all of its security features.

Threat Advisory: Snowflake Data Breach Impacts Its Clients

On May 20, 2024, Live Nation discovered and disclosed an unauthorized activity in its third-party cloud database environment, which was eventually identified to be Snowflake, in its SEC filing. The database contains information regarding the company, primarily from its Ticketmaster subsidiary. Following this filing and in the following days, analysts discovered multiple clients of Snowflake have had data posted on the Dark Web for sale.

Powering visibility, intelligence processing and delivery of quality information for SOC teams

Today’s cyber threats continue to evolve at pace as adversaries compress the time between initial entry, lateral movement, and breach. At the same time, the rise of generative AI has the potential to lower the barrier of entry for low-skilled adversaries, making it easier to launch attacks that are more sophisticated and state of the art.

This Month in Datadog: State of DevSecOps report, Event Management, Container Image Trends, and more

Datadog is constantly elevating the approach to cloud monitoring and security. This Month in Datadog updates you on our newest product features, announcements, resources, and events. To learn more about Datadog and start a free 14-day trial, visit Cloud Monitoring as a Service | Datadog. This month, we put the Spotlight on Datadog’s State of DevSecOps report.

The 443 Podcast - Episode 293 - Recall Windows Recall

This week on the podcast, we discuss a new Microsoft Windows feature that is shaping up to be a security nightmare. Before that, we discuss a new research initiative from the Advanced Research Projects Agency for Health (ARPA-H) that could make big improvements in healthcare cybersecurity. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Random but Memorable - Episode 12.9: Previously Generated Internet Slop with Jason Meller

Should businesses be tying compensation and bonuses to security performance? We debate this question and more in the latest instalment of Watchtower Weekly. It's also time to get your best guesses ready for the penultimate game of Security Blank! Plus, we sit down with Jason Meller to discuss the recent acquisition of Kolide and what it means for the future of 1Password. In this episode, you'll learn how we can all make the productive way to work the secure way to work.

Role-Based Access Control or Multitenancy-Which is Right for Your Organization?

Choosing the right software to defend your organization, both in real-time and in retrospect, is one of the most important decisions an organization can make. Security teams need to be able to view activity and affect access quickly, and that becomes more difficult at bigger, complex enterprises. A classical approach to this problem is role-based access control (RBAC), but for many organizations, multitenancy is a better fit.