Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Breaking News

Ask the Experts: Black Friday Bot Attacks

As Black Friday approaches, retailers are gearing up for the inevitable surge in online traffic. But cybercriminals are also preparing for this high-stakes season, fine-tuning their bot attack strategies to exploit inventory, pricing, and customer accounts. To shed light on these threats and what retailers can do to prepare, we consulted five experts from Netacea who shared their insights on the bot attack landscape during Black Friday and beyond.

Why Multifactor Authentication (MFA) Alone Isn't Enough to Stay Secure

Once upon a time, a username and a password were all you needed to get into most online accounts. It was convenient for users — but also convenient for hackers, who only had to acquire two static strings of characters to get unlimited access to a system until their victim (or their victim’s IT department) realized something was up.

CVE-2024-9264 - Grafana's SQL Expressions Vulnerability

A critical vulnerability, CVE-2024-9264, has been discovered in Grafana, the open-source analytics and visualization platform widely used by organizations worldwide. According to Netlas.io, over 100,000 Grafana instances may be vulnerable globally, with nearly 19,000 in the U.S. alone. This vulnerability poses significant risks, enabling remote code execution (RCE), allowing attackers to execute arbitrary system commands and access sensitive files.

The Role of Digital Forensics and Incident Response (DFIR) in Cybersecurity

If the last few years have taught us anything, it’s that every organization — no matter how big or well-protected — is vulnerable to cyber attacks. From major corporations to government agencies, attackers have breached seemingly ironclad security systems. If your organization ever suffers a data breach, you’ll need a digital forensics and incident response (DFIR) plan. The time to craft one is now. DFIR combines two separate but related ideas.

Azure Key Management Solution: Differentiate and Choose the Best As per the Requirement

Azure is Microsoft’s cloud, allowing for software and hardware-based or hosted in the cloud and providing computing, analytical, storage, and networking services. From these services, the users can selectively take what they want to build new applications in the public cloud or migrate other applications already running to the public cloud.

Securing Identities in Business Data Flows

In today’s business ecosystem, data exchanges are critical for operations. From APIs to FTP connections, Electronic Data Interchange (EDI), and Virtual Desktop Infrastructure (VDI), data transfers happen continually, each using specific protocols and requiring authentication to ensure security and confidentiality. These interactions rely on a vast array of identities, keys, and credentials that need consistent management and periodic rotation to maintain security.

What is Blind XSS? How to Detect and Prevent Blind XSS Attacks & Vulnerabilities?

Blind Cross-Site Scripting is a type of Cross-Site Scripting attack in which the injected script is executed in the context of another page and different circumstances compared to the page in which it was inserted. Blind XSS differs from regular XSS attacks as the attacker cannot see the effect of the injected script in his or her browser since the script is executed in a place that the attacker can not access.

Managed Vulnerability Scanning: Key Findings and the Importance of Regular Patching

There is no doubt about the value of conducting Managed Vulnerability Scanning. Trustwave has posted multiple blogs on the topic, (just check here, here, and here) for a look at how Trustwave approaches this very important cybersecurity procedure. One point we have not covered is exactly what kind of vulnerabilities Trustwave SpiderLabs’ analysts find during a scan. Are they truly dangerous? What would happen if the client had opted to give a pass to an MVS occurrence?

New Strategies to Auto Block Website Ping Attack for Enhanced Security

It is more important than ever to protect websites from hacking in today's digital world. One common type of attack is the Ping Flood, also called the "Ping of Death." This is when a lot of ping requests are sent to a website's server at once, slowing it down or even crashing it. Attacks like these are more likely to happen as websites get busier and more complicated. This is why it's important to have strong defenses in place.

Fraud Week: The Insider Threat Risk that Companies Ignore at their Peril

External risks, such as cyber scams, ransomware, and identity theft, often steal the limelight. Just look at the numbers: our threat lab reports that 105,571 malware attacks have been blocked daily in the last month, translating into one incident every second. However, insider threats, while more difficult to detect, can be just as damaging to organizations.