Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Elastic Global Threat Report Breakdown: Defense Evasion

When we published the Elastic Global Threat Report in 2022, it included threat trends and correlations from our analysis of telemetry data shared by our users. In addition to telling us about how well features work for them, it also represents our visibility of the threat landscape. About 34% of the techniques we saw were related to defense evasion, which we believe is a direct result of endpoint security innovations.

CSPRNG: Random algorithms need security too!

If I throw a coin high up in the air, I know the outcome — it will either be heads or tails. However, I can’t predict which it will be. I will certainly be able to guess with a 50% chance, but I can’t be 100% certain. If I were to roll a die, my certainty becomes less (1 in 6). However, I still know what the output could be. Computers are great at many things, especially predictability. They are deterministic and creating a truly random number is impossible.

How The "No Fly List" Hack Highlights the Need for Cloud Security

The names of over 1.5 million individuals were published on the dark web in January after ahacker gained access to the TSA’s “No Fly List.” That’s a lot of names (including aliases and birth dates), so why wasn’t the list secure, and how did it get leaked? The entire breach came down to one small business with one misconfigured server.

Cyber Security Pandemic: Ambush and Resistance

The first nationwide lockdown was implemented in Italy on 9th March 2020. The IT employee sitting in Buenos Aires could not have imagined a 234-day lockdown at that point. The US of America could not have predicted the loss of 1.1 million lives over the couple of years that follow. The world of commerce was busy grappling with the second-largest global recession in recent history.

Mapping the MITRE ATT&CK Framework to API Security

With hundreds of contributors, the MITRE ATT&CK Framework has become a vital resource of open source knowledge for the security industry. CISOs and cybersecurity professionals around the globe rely on the framework to increase their understanding about different cyber-attack tactics, techniques and procedures (TTPs). With insights about TTPs relevant to their specific platform or environment, organizations gain tremendous value to combat cyber threats.

Audit domain controller logon activity: ADAudit Plus User Logon report

ManageEngine ADAudit Plus is a UBA-driven auditor that bolsters your Active Directory (AD) security infrastructure. With over 250 built-in reports, it provides you with granular insights into what’s happening within your AD, such as all the changes made to objects and their attributes. This can include changes to users, computers, groups, network shares, and more.

Banking & Finance: What is Enhanced Due Diligence(EDD)?

EDD is a vital component of the KYC compliance procedure in banking. It comprises gathering information to verify clients’ identities and assess the degree of money laundering risk that each customer poses. As a result, the client requested substantially more details during the EDD process than during the CDD process, because this information might be used to reduce the related risks.

It's time to rethink how we market and sell security products

With changing technology, evolving security threats, and the vast number of vendors out there, companies intent on successfully selling their products need new approaches. At the end of the day, it isn’t about convincing someone to buy your product whether they need it or not, but ensuring that your product is the right fit for them and that it will solve their problems—some of which they probably don’t realize they have.

How to Identify and Prevent the Top Software Vulnerabilities in 2023?

Software is an intricate part of our lives, with its presence in nearly every device and aspect of technology. However, the software can also be vulnerable to malicious threats, given that the code within it can contain flaws. As a result, software vulnerability has been on the rise over the years and is likely to continue increasing in 2023. Organizations and businesses alike need to remain proactive about their security measures when it comes to their systems, software, and data management.