Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Is This Blog Real or a Deepfake?

What is the scariest aspect of deepfake videos and audio? A: How accurate they appear? B: How will threat actors implement these creations? C: The amount of potential damage a deepfake can cause? D: None of the above? My argument would be D. For me, the most frightening aspect is how easy a deepfake video file is to create and the fact that free tools to generate a very realistic fake video of anyone are just a quick Google search away.

Block the attack paths into your Kubernetes clusters

In today’s world of limited time, we need to be laser-focused on our priorities. This goes double for mission-critical activities, like cybersecurity. We want to prioritize fixing the issues that have the most significant impact on our security posture. An attack path is like a roadmap for attackers, outlining the steps they can take to exploit security weaknesses.

Why the Rise of Digital Piracy Is More Popular Than Ever

There’s nothing like kicking back after a long day and catching up with your favorite TV shows. However, the days of password-sharing and ad-free content are long gone, and people are favoring a life of digital piracy over the rising costs of subscription platforms. Want to listen to a new album? Sure, but it’s only available on Tidal. How about that TV show a colleague recommended? Of course! That will be one HBO subscription, please.

A CISO's perspective: Why I've read the Elastic Global Threat Report

It’s that time of year again. Fall leaves are turning colors, families are gearing up for the holidays, and many vendors are releasing different reports during cybersecurity month. Our researchers at Elastic Security Labs released the 2023 Global Threat Report last week after months of analysis on more than 1 billion data points. As the CISO of Elastic, my team and I leveraged last year’s report findings and predictions to strategize for the changing threat landscape.

Getting started with query parameterization

When web applications rely on user-supplied data, there is a potential risk of SQL injection attacks. SQL injection is a technique used to alter a SQL statement by manipulating user input. Specifically, attackers send malicious SQL code to the database to bypass security measures and gain unauthorized access to data. The consequences can be severe, ranging from sensitive information leaks to complete system loss.

How to secure JavaScript applications right from the CLI

According to Snyk's 2022 State of Open Source Security report, the average JavaScript project has 49 vulnerabilities, including common ones like unsafe dependencies, cross-site scripting (XSS), weak input validation, and cross-site request forgery (CSRF). And given JavaScript's widespread use, robust security measures are increasingly important to safeguard your applications from cyberattacks.

Streamline Document Structure and Access Control with Egnyte and Microsoft Teams Integration

As the world of remote work and digital collaboration continues to evolve, the need for efficient file management and secure access control is becoming increasingly critical. To address this, Egnyte has rolled out additional improvements to its integration with Microsoft Teams that are aimed at simplifying permission management, improving document organization, and enhancing collaboration processes. Automated MS Teams and Channels mapped to the Egnyte Folder.

The growth of APIs attracts Cybercrime: How to prepare against cyber attacks

Application Programming Interfaces (APIs) have profoundly transformed the internet's fabric. In the pre-API era, digital interactions were limited by siloed systems functioning in isolation. APIs dismantled these barriers by introducing a universal language that diverse applications could comprehend. This linguistic bridge facilitated an unprecedented level of interconnectivity between software entities.

Oh-Auth - Abusing OAuth to take over millions of accounts

OAuth (Open Authorization) is one of the fastest adopted technologies in the AppSec domain. From its first introduction in 2006, as an attempt to introduce a standard authorization protocol, it has become one of the most popular protocols for both user authorization and authentication, and it’s being used by almost every major web service and website today. One of the reasons for its huge popularity is its ease of implementation.