Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Original Attacks: SafeBreach Labs Discovers Previously Unknown Attack Methods

Researchers at SafeBreach Labs have recently discovered several novel attack methods which can circumvent common security controls and execute some jaw-dropping malicious actions including: SafeBreach threat researchers have successfully executed and verified each of these attack methods, however none have been used in the wild at this point.

CrowdStrike Debuts Counter Adversary Operations Team to Fight Faster and Smarter Adversaries as Identity-Focused Attacks Skyrocket

CrowdStrike is proud to announce the launch of CrowdStrike Counter Adversary Operations, a newly formed, first-of-its kind team that brings together CrowdStrike Falcon® Intelligence and the CrowdStrike® Falcon OverWatch™ threat hunting team to disrupt today’s adversaries and ultimately raise their cost of doing business.

Enhance Threat Detection and Response with Intel DNS

ThreatQuotient and Infoblox recently hosted a webinar, where they demonstrated how the combination of DNS Intel and the use of a Threat Intelligence Platform (TIP) help to improve threat detection and response capabilities. Infoblox specializes in DNS Intelligence where their internal experts analyze, process and qualify DNS intelligence (analyzing around 70 billion DNS requests). The results of these analyses provide customers with an enriched, qualified and reliable source of information.

Remote Unauthenticated API Access Vulnerabilities in Ivanti

Ivanti has warned users of its Endpoint Manager Mobile (EPMM) mobile device management (MDM) platform, urging immediate actions to address two vulnerabilities – including a zero-day exploit. These vulnerabilities can potentially be exploited by an unauthorized attacker, leading to unauthorized access to sensitive data and the execution of malicious actions on the affected system.

WormGPT and FraudGPT - The Rise of Malicious LLMs

As technology continues to evolve, there is a growing concern about the potential for large language models (LLMs), like ChatGPT, to be used for criminal purposes. In this blog we will discuss two such LLM engines that were made available recently on underground forums, WormGPT and FraudGPT. If criminals were to possess their own ChatGPT-like tool, the implications for cybersecurity, social engineering, and overall digital safety could be significant.

What Is the Significance of Mobile Device Management in Strengthening Cloud Security?

The rise of the cloud has been a remarkable and transformative switch from physical devices to storing our files online. What surfaced in the late 90s is today so commonplace that every business in this world—big or small—has something on the cloud. The cloud has changed the future of data storage and accessibility forever. One can rightly say that the cloud was the stepping stone to digital transformation. The popularity of mobile devices is not surprising either.

Protecting Cyber Security in The Finance Sector

Cyber Security is increasingly important in the finance sector, as financial institutions need to protect customer data. Financial organisations handle a huge amount of valuable information, from account details and passwords to credit card numbers and personal identities. With this comes an increased risk of cybercrime and malicious attacks on their networks and systems.

EP 33 - The Evolution of Privileged Access Management (PAM)

Crystal Trawny, Optiv’s Practice Director, Privileged Account and Endpoint Privilege Management (PAM/EPM), joins host David Puner in exploring the ever-evolving identity landscape and how emerging threats impact organizations’ cybersecurity requirements. Through the eyes of an end user, Trawny shares best practices for overcoming change resistance, creating effective deployment timelines and avoiding scope creep.

DDoS Empire Shutdown: The Why, What, When & How

Starting from the beginning of 2023, the FBI and other law enforcement agencies worldwide have come together in a united effort to combat cybercrime, with a specific focus on ransomware. This alliance has already resulted in significant arrests, including those of individuals associated with Pompompurin and LockBit, as well as the dismantling of the Hive ransomware group’s infrastructure.

Rubrik and Laminar: Together Securing the World's Data

Today we are excited to share that Rubrik has entered into an agreement to acquire Laminar, the leader in Data Security Posture Management (DSPM), to realize a common vision to secure the world’s data. The combination will create the industry’s first offering to combine cyber recovery and cyber posture and deliver complete cyber resilience across enterprise, cloud, and SaaS.