Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

FedRAMP for The Private Sector: What You Need to Know

FedRAMP is the Federal Risk and Authorization Management Program, and it’s one of the common security frameworks used by the government, its agencies, and the contractors that work with it. However, it’s not solely restricted to the government: FedRAMP can be used in the private sector just as well. The question is, how does it work if you want to do so, do you need to follow it, and what are the benefits of doing so?

What Is a Browser Hijacker?

A browser hijacker is a type of malware that infects an internet browser. When your Internet browser becomes infected, it’s done without your knowledge or consent so you may not even notice it’s there until it’s too late. Typically, browser hijackers are used by cybercriminals to redirect users to malicious websites for financial gain, but they can also be used to gather your personal information and spy on your online activity.

TrustCloud Product Updates: March 2024

You know us: Every month we’re cooking up something new! Here are the latest updates to hit TrustCloud this month. TrustShare Import your knowledge base without going through the questionnaire import process. Now you can import your knowledge base in one click without having to wait. Importing your knowledge base also won’t impact your total questionnaire usage counts, which will make it easier to keep track of your total questionnaire usage.

Smart thresholds: The answer to your security alert fatigue

SIEM solutions operate based on thresholds. These thresholds serve as predefined benchmarks that generate alerts when the alert criteria is met. While effective to some extent, this approach falls short on multiple fronts, particularly in the context of sophisticated attacks and dynamic environments. Static thresholds falling short One of the fundamental flaws of static thresholds lies in their rigidity.

What is the Dirty COW exploit, and how to prevent it

Dirty COW, a seemingly light-hearted name, masks a severe Linux privilege escalation issue. This bug has affected many older Linux systems, which is concerning given that 41% of web servers run on Linux. Despite widespread patches in distributions like Ubuntu and Red Hat, Dirty COW remains a threat, particularly to outdated systems. As a significant security flaw, it poses risks to various devices and servers even in 2024.

Quantifying NIST CSF Maturity Levels for Data-Driven Cyber Programs

Cybersecurity maturity assessments play a fundamental role in helping chief information security officers (CISOs) determine the level of risk their organizations face due to cyber activity. By illuminating the various areas that are exposed to exploitation, these evaluations serve as a blueprint for cybersecurity leaders tasked with making the business secure amid an increasingly risky operational landscape.

A Simple 'Payment is Underway' Phishing Email Downloads RATs from AWS, GitHub

Analysis of a new initial access malware attack shows how simple these attacks can be while also proving that malware can reside on legitimate repositories. Security analysts at cybersecurity company Fortinet dissect the methods and actions taken by a new malicious Java-based downloader intent on spreading the remote access trojans (RAT) VCURMS and STRRAT.

The Number of New Pieces of Malware Per Minute Has Quadrupled in Just One Year

The threat of novel malware is growing exponentially, making it more difficult for security solutions to identify attachments and links to files as being malware. According to BlackBerry’s new Global Threat Intelligence Report, the problem of novel malware has been continually growing over the last year. At the beginning of last year, BlackBerry was detecting new malware at a rate of just one per minute. By the next month, it was 1.5, 2.9 pieces per minute by August of last year.