Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to provision certificates for internal services with Teleport Workload Identity

In this day and age, establishing cryptographic trust and encryption between internal services is a must. Without this, attackers who gain access to your internal networks can easily impersonate services and intercept exchanged data. As time has gone on, the potential impact of compromise has only grown as machines are trusted with increasingly sensitive data and completing increasingly important tasks.

Hey SDDL SDDL: Breaking Down Windows Security One ACE at a Time

Windows permission misconfigurations remain a common attack vector in enterprise environments. Attackers consistently leverage these misconfigurations for privilege escalation, with Security Descriptor Definition Language (SDDL) emerging as a blind spot. From LockBit's manipulation of event log permissions to RomCom's exploitation of Task Scheduler vulnerabilities (CVE-2024-49039), SDDL misconfigurations have become a prime target for sophisticated attacks.

Choose Your Infrastructure: Why Vendor Selection Should Matter to CISOs

When running a cybersecurity operation for an organization, there are numerous competing priorities—and the CISO is responsible for striking an intricate balance between them. Of course, the overall security posture is imperative, as are the organization’s broader business objectives. The CISO has to determine the organization’s tolerance for risk, while simultaneously understanding the most essential security use cases for the business and establishing protections for them.

How Professional Translators Handle Technical and Industry-Specific Jargon

The world of professional translation is complex. Translators work with highly technical, specialized texts in a wide variety of fields, from medical and legal writing to technical manuals and corporate communications. One of the biggest challenges is navigating industry-specific terminology and jargon. So, how do professional translators handle all that technical language? Through expertise, research, and some clever tricks of the trade.

Criminal Background Checks for Rideshare Drivers

The main advantage of Uber and similar services is the convenience for both drivers and users of it. It's quite simple to start earning some extra cash. All you need to do is register and provide some essential info on yourself and your vehicle, and you can start chasing rides. On the other hand, some people think that criminal history can be a serious issue. If you ask people on the street, we think that most of them would refuse to accept a ride from an ex-criminal.

The Definitive Guide to Dedicated Servers: Maximum Performance, Enhanced Security, and Total Control

In today's digital age, businesses and individuals require reliable hosting solutions to support their online operations. One such powerful solution is a dedicated server. But what exactly is a dedicated server, and why is it essential for many businesses? Let's dive into the details.

How to Set Up Proactive Threat Intelligence

What is the best way to avoid suffering multi-million-dollar security incidents? Know your cyber enemy in advance. This means having quality threat intelligence on all the threats targeting your business, industry, or country. Let's take a look at one of the most effective methods of collecting intel that your organization can use to better predict, detect, and respond to cyber attacks.

Web Application Penetration Testing

Web application penetration testing involves performing a simulated attack on a web app to determine weaknesses that hackers can exploit. The testing process uses emulations of real-world attacks to identify hidden attacks such as SQL injection, cross-site scripting (XSS), or cross-site request forgery (CSRF). What is the worst that could happen if you don’t continuously test your web application for vulnerabilities?

Phishing for Love: A Sharp Surge in Valentine's Day-Themed Scams

This Valentine’s Day, Cupid wasn’t the only one taking aim. Our Threat Research team noted a 34.8% increase on Valentine-related threat traffic in comparison to February of 2024. Leveraging impersonation and social engineering techniques, attackers have used a seasonal event to exploit heightened emotions and a sense of urgency, effectively increasing the likelihood of success in their phishing campaigns.

Helping civil society monitor cyber attacks with the CyberPeaceTracer and Cloudflare Email Security

Civil society organizations have always been at the forefront of humanitarian relief efforts, as well as safeguarding civil and human rights. These organizations play a large role in delivering services during crises, whether it is fighting climate change, support during natural disasters, providing health services to marginalized communities and more.