Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

June 2024

CVE-2024-24919: Check Point's Quantum Gateway comes under Attack as Hackers exploit Zero-Day Vulnerability

Check Point Cybersecurity has issued hotfixes to address a zero-day vulnerability in its VPNs that has been exploited to gain remote access to firewalls and potentially infiltrate corporate networks. On 27.04.2024 (Monday), the company initially alerted customers to an increase in attacks targeting VPN devices, offering guidance on how administrators can safeguard their systems.

Strengthening AI Chatbot Defenses with Targeted Penetration Tests

The world is quickly seeing the rise of AI powered customer service. The conversational agent chatbots enhance the customer experience but also introduce a new attack vector. Here's what you need to know about strengthening AI chatbot defenses. Many AI driven technologies have access to vast data sources and access to functions that assist users. AI chatbots can be used in many ways such as answering questions about an item in stock, help develop code, to helping users reset their password.

Navigating the cyber insurance maze: How to avoid claim denials

Cyber insurance is a critical form of risk management, designed to mitigate the financial impact of a breach or other security incidents. By spreading the risk, it helps reduce the potentially catastrophic consequences to manageable levels. Cyber insurance is a fundamentally financial tool that is often handled by the financial or insurance arm of any organization, with strong involvement of the cyber security teams. While complex, this blog aims to simplify the essentials.

The password problem: Why organizations are going passwordless

Knowledge is power, right? Well, yes – except when it comes to access and authentication. That’s because knowledge-based factors, in the form of passwords, are making organizations less powerful, and more vulnerable. As a result, many are looking toward a future beyond passwords. You may have seen the Forrester report estimating that 80% of security breaches involved privileged credentials.

Strengthening compliance and risk management with Elastic Observability: A case for India's banking sector

In navigating the complex landscape of regulatory compliance and risk management, India's banking sector faces unique challenges, particularly in meeting directives outlined by the Reserve Bank of India (RBI) and the Indian Computer Emergency Response Team (CERT-In). As organizations strive to adhere to these stringent requirements, Elastic Observability emerges as a powerful ally, offering advanced log analytics capabilities tailored to address regulatory mandates and mitigate operational risks.

Building Cyber Resilience Amid Azure Migration

With ransomware increasing and a complex, business-critical cloud migration on the horizon, BSM, one of the world’s largest shipping companies, was seeking a solution to monitor its environment for potential threats, both now and in the future. Working with Kroll gives the company greater visibility across its global network of offices and ships to better detect and respond to threats.

Generate Security Audits - What you need to know

The Generate Security Audits security policy setting determines which accounts can be used by a process to generate audit records in the Security log. When certain events occur such as unauthorized access to a computer, file and folder access attempts and security policy changes, the Local Security Authority Subsystem Service (LSASS) writes these events to the log. This information in the Security log can be used to trace any unauthorized access to the system.

Access Credential Manager Trusted Callers and ICAM: Windows Security

Windows credential manager securely stores and manages user credentials such as usernames, passwords, and certificates. These credentials are often used to access various resources, including network shares, websites, and applications, facilitating access to information and managing digital identities.

10 Best Tools to Bypass AI Detection: Ensuring Your Content Remains Undetected

In the rapidly evolving digital landscape, the advent of AI writing tools has revolutionized content creation. However, with this technology's rise, the need to bypass AI detectors has become increasingly crucial for many creators aiming to maintain the originality and human essence of their content. AI detectors are designed to identify content generated by AI, potentially leading to issues with authenticity and even penalization in certain contexts.

How CASB and DLP Work Together to Safeguard Data

Cloud computing has changed the way we work, and mostly for the better. Widely available cloud applications let us create new documents, access our existing files, and communicate with our coworkers from just about anywhere. However, cloud computing has also created new data security and privacy concerns. A comprehensive CASB DLP policy can help address these concerns and keep your organization’s data exactly where it belongs.