Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Breaking News

Add Alias in Active Directory

Microsoft Active Directory is a directory service for Windows domain networks. Active Directory serves as a centralized database which stores information about network resources, including users, computers, and services. It plays a significant role in network management and security, providing a framework for user authentication, authorization, resource management, and policy enforcement. This allows organizations to manage permissions and access rights across the entire network efficiently.

Follow-Up: Arctic Wolf Observes Ongoing Exploitation of Critical Palo Alto Networks Vulnerability CVE-2024-0012 Chained with CVE-2024-9474

On November 19, 2024, Arctic Wolf began observing active exploitation of the recently-disclosed CVE-2024-0012 and CVE-2024-9474 vulnerabilities impacting Palo Alto Networks PAN-OS software. When chained together, these vulnerabilities allow an unauthenticated threat actor with network access to the management web interface to gain administrator privileges.

Databunker, Skyflow, and Piiano: A Comprehensive Privacy Vault Comparison

Managing sensitive data while meeting compliance and security standards is an ever-growing challenge for organizations. Today, secure data management is a top priority, especially in industries like healthcare, finance, and fintech. This focus is expected to intensify in the coming years. To address these needs, privacy vault solutions like Databunker, Skyflow, and Piiano have emerged. Each offers unique capabilities tailored to specific use cases.

Emerging Threat: Palo Alto PAN-OS CVE-2024-0012 & CVE-2024-9474

On November 18, 2024, Palo Alto Networks (PAN) fully disclosed two serious vulnerabilities in PAN-OS software that had previously been partially disclosed on November 8th. The first vulnerability, CVE-2024-0012, is a critical severity (9.3) authentication bypass in the PAN-OS management web interface. It allows unauthenticated attackers with network access to gain administrator privileges by bypassing the authentication check entirely, essentially telling the server not to check for authentication at all.

How Sysdig streamlines cloud security posture management: Proactive risk management and tailored insights and controls

Attack surfaces in the cloud are expanding at a breakneck pace. Cloud security has reached an unprecedented level of complexity — ranging from misconfigurations and vulnerabilities to advanced threats and compliance challenges, all while malicious actors are increasingly using generative AI to target your cloud infrastructure.

Vanta unveils new product innovations to move compliance beyond the standard

These days, the bar for proving trust keeps getting higher. A SOC 2 report used to signal the end of security reviews—now, it marks the beginning. Security and GRC teams are tasked with monitoring and remediating a growing web of controls, vendors, questionnaires, and risks, which is made even more complex by discerning buyers.

Python NodeStealer Targets Facebook Ads Manager with New Techniques

In September 2024, Netskope Threat Labs reported a Python-based NodeStealer targeting Facebook business accounts. NodeStealer collects Facebook and other credentials stored in the browser and its cookie data. For over a year, we have tracked and discovered multiple variants of this infostealer. It is now targeting new victims and extracting new information using new techniques. In this blog post, we will dissect the development of the Python NodeStealer from multiple samples in the wild.

Data Leakage Protection Solutions on the Rise Amid Increasing Cyber Threats

Protecting their private data is always a task for businesses in today's cyber world, where data breaches and cyberattacks are steadily on the rise. One of the biggest threats to data privacy and security is data leakage, which happens when private information leaves an organization's secure setting either by accident or on purpose. Companies all over the world are realizing they need Data Leakage Protection (DLP) options right away because of the growing number of high-profile data breaches.

Jit Achieves AWS Security Competency: A Milestone in Developer-First Security Innovation

We’re thrilled to announce that Jit has achieved the AWS Security Competency, a significant milestone that underscores our commitment to revolutionizing product security for developers and security teams alike. This recognition from AWS validates our leadership in the security space and highlights the value we bring to organizations looking to embed automated security into their development workflows.