Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Building Graph API Custom Plugins for Copilot for Security

As we explored the capabilities of Copilot for Security, we discovered that while the native plugins offer access to a vast array of data, they didn't cover everything we needed for some of our specific use cases and promptbooks. For instance, we wanted detailed insights into Conditional Access policies from Entra ID, Intune policies, Secure Score, and more. Although Microsoft continues to enhance the native plugins by adding new skills, we opted to develop our own custom plugins.

Fireblocks Integrates with Axelar

Axelar is a Web3 interoperability platform designed to connect various blockchains. Its technology facilitates multichain applications that span different networks, aiming to address scalability challenges that can hinder development and integration. AXL, a proof-of-stake token, makes it possible for this infrastructure to operate at the highest, most decentralized standard of security.

CVE discovery, PoC Development, IAB Listings, to Ransomware Attacks: How Cybercriminal Forums Facilitate the Lifecycle

By Olivia Betts and Adam Price In July 2024, CloudFlare identified that it can take cybercriminals as little as 22 minutes to weaponise a publicly available Proof-of-Concept (PoC) exploit following its release. The IT services management company noted an increase in scanning for disclosed Common and in attempts to weaponise available PoCs across 2023 and 2024.

Malicious Inauthentic Falcon Crash Reporter Installer Distributed to German Entity via Spearphishing Website

On July 24, 2024, CrowdStrike Intelligence identified an unattributed spearphishing attempt delivering an inauthentic CrowdStrike Crash Reporter installer via a website impersonating a German entity. The website was registered with a sub-domain registrar.

Hacktivist Entity USDoD Claims to Have Leaked CrowdStrike's Threat Actor List

On July 24, 2024, hacktivist entity USDoD claimed on English-language cybercrime forum BreachForums to have leaked CrowdStrike’s “entire threat actor list.”1 The actor also alleged that they had obtained CrowdStrike’s “entire IOC list” and would release it “soon.” In the announcement, USDoD provided a link to download the alleged threat actor list and provided a sample of data fields, likely in an effort to substantiate their claims.

Trustwave Named as a Representative Vendor in the 2024 Gartner Market Guide for Digital Forensics and Incident Response Retainer Services

For the second week in a row, Trustwave proudly announces recognition from the industry analyst firm Gartner. Today, Trustwave is proud to reveal that Gartner has named us as a Representative Vendor in the 2024 Gartner Market Guide for Digital Forensics and Incident Response (DFIR) Retainer Services. This news follows Trustwave's announcement last week stating we were named a Representative Vendor in the 2024 Gartner Market Guide for Managed Detection and Response.

WatchGuard Endpoint Release Process

Recent news of a global IT disruption caused by a security vendor’s content update has driven important conversations about quality assurance processes for endpoint products and content updates. At WatchGuard, with more than 30 years of experience in this industry, we know well the sensitivity of the update process and wanted to take this opportunity to highlight the processes we have in place to protect our valued partner community and customers from the impacts of a flawed update rollout.

The Hidden Dangers and Opportunities of Generative AI: What Enterprises Need to Know

Since the launch of ChatGPT in November 2022, generative AI (genAI) has seen rapid enterprise adoption. According to researchers in the Netskope Threat Labs, as of June 2024, an astonishing 96% of organizations are using various types of genAI apps. This widespread adoption is transforming how businesses operate, but with great power comes great responsibility—and risk.

Building a comprehensive Trust Center

In today's digital landscape, trust is paramount. Customers want to know that their data is secure and that they can rely on the companies they do business with. ‍ One of the best ways to provide this assurance is through a well-crafted, up-to-date Trust Center. But what exactly should go into a Trust Center? How easy are they to maintain, and how much manual work do they save security teams?