Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

DevOps

What You Need to Consider For Managing Third-Party Risk

Managing third-party risk is not a high priority, Forrester data finds. And that’s concerning. Juggling was a skill that organizations in the public and private sectors found themselves having to learn in the last two years because of the need to deal with new business priorities and strategic initiatives on top of managing lots of new security risks. Mastering the art of keeping all the balls in the air is something security, compliance and risk professionals must master in 2023.

Malicious Code Deletes Directories If You Do Not Have a License

Our research team here at Mend has identified a new kind of malicious code that attackers can use to exploit genuine concerns about security and licenses. The code in the case below is used to prevent people from using unlicensed software, specifically by removing the code if it detects that the software is not licensed during the deployment stage. The code is tricky to understand and uses a web request to check if the software is being used legally.

Getting Started With Teleport Desktop Access

In this video, we'll configure Teleport and Active Directory to provide secure, passwordless access to Windows desktops. In addition, you get Teleport's RBAC system to control access to these Windows desktops, support for copying and pasting to and from remote hosts, as well as Teleport auditing capabilities to capture logs and recordings of all desktop connections.

Audit: Force audit policy subcategory settings

Audit: Force Audit Policy Subcategory is a security policy that allows users to leverage the most accurate and advanced policy settings in Windows Vista. The current version of the Active Directory does not have a feature for managing the audit policy settings, which is why the user has to manually apply Audit: Force Audit Policy Subcategory Settings and configure it to ensure everything works well.

Devices: Prevent Users From Installing Printer Drivers

Devices: Prevent Users From Installing Printer Drivers, as the name suggests, is a security setting that prohibits unauthorized printer usage on specific devices. Once the setting is configured, the types and number of printers used on specific devices will be confined to the approved ones. The main purpose of limiting printer drivers’ installation and usage on workstations is to prevent people from printing unnecessary stuff, which would increase the cost of business operations.

MITRE ATT&CK and Windows registry key

MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is a comprehensive knowledge base of tactics, techniques and procedures that adversaries use to conduct cyber-attacks. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.