Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

5 Key Cybersecurity Insights from The World Economic Forum in Davos

SecurityScorecard has been in Davos, Switzerland for the past week with heads of state, CEOs, and other global leaders as part of the 2023 World Economic Forum’s Annual Meeting. Along with climate change, sustainability, and geopolitical complexities, cybersecurity is one of the hottest topics of WEF’s official programming and the myriad private events that are part of the Davos annual experience.

Protect your cloud infrastructure at scale with Wiz and Tines

Increased cloud adoption has introduced new security risks; organizations need to protect invaluable, sensitive data that can be accessed from anywhere. Traditional methods no longer suffice - today’s security operations teams must adopt innovative solutions and streamlined processes to effectively manage the increase in complexity and ensure mission-critical cloud loads are safeguarded.

From Registry With Love: Malware Registry Abuses

The Windows Registry is one of the most powerful Windows operating system features that can tweak or manipulate Windows policies and low-level configuration settings. Because of this capability, most malware or adversaries abuse this hierarchical database to perform malicious tasks on a victim host or environment. Over the last 2 years, the Splunk Threat Research Team has analyzed and reverse engineered some of the most prevalent and successful malware families.

Cloud Threats Memo: Threat Actors Continue to Abuse Cloud Services to Deliver Malware in 2023

Our most recent Cloud and Threat Report highlighted how threat actors abuse cloud services (with a special focus on cloud storage apps) to deliver malicious content (and yes, OneDrive leads the chart of the most exploited apps). To confirm that this trend will likely continue in 2023, researchers at Trend Micro have discovered an active campaign, launched by a threat actor named Earth Bogle.

Preparing for Your Digital Afterlife With Secure Password Management

With the average person spending about two and a half hours on social media daily and possibly up to six hours on the internet, there’s no doubt we’ve all built a legacy on the web. Have you ever thought about what happens after you pass away? Will your online presence turn into ghost accounts that are inaccessible to loved ones and susceptible to attackers?

8 Most Common Cloud Misconfigurations to Look Out For

Recently, Amazon accidentally exposed information on Amazon Prime Video viewing habits to the public. In addition, Thomson Reuters news and media company admitted that their servers had compromised 3TB of data by public-facing ElasticSearch databases. Well, these are the type of news we often see on the front page of cybersecurity forums. But if you dig a bit deeper, you will find that these data leaks are caused by misconfiguration, not cyber attacks.