Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The 443 Episode 227 - CISA Warns of Weaponized RMM Software

On today's episode, we cover a recent Department of Justice operation that resulted in taking down a major ransomware organization. After that, we cover two recent publications from CISA, the first on malicious use of legitimate RRM software and the second giving guidance to K-12 on how to address cybersecurity concerns. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

The Simply Cyber Report: January 30, 2023

Microsoft has started blocking the execution of XLL add-ins downloaded from the Internet. The hacking group DragonSpark is leveraging Golang source code interpretation to evade detection. Threat actors are turning to Sliver to replace more popular frameworks Cobalt Strike and Metasploit. Over 4,500 WordPress sites have been hacked and Emote malware makes a comeback.

The State of Application Security Q4 2022

The report – “The State of Application Security Q4 2022” is based on a sample size of 1400+ applications. With new threats rising daily, application security is the primary concern for many businesses today. It exposes sensitive information like customer data to the outside world. To benchmark your security program and stay on top of the emerging threat, we conducted an in-depth analysis of application security.

Craft Fireside Chat: Building Trust in a Zero Trust World

Watch Christina Cacioppo (CEO & Co-Founder at Vanta), Diane Garcia (Director of Operations at Scratchpad), and Bil Harmer (Operating Partner, Security at Craft Ventures) for a conversation about the importance of trust and compliance and how to execute a strategy that works for your company and customers.

Password Spray Demo with Kevin Mitnick

Kevin Mitnick, KnowBe4's Chief Hacking Officer, demonstrates how bad actors conduct "password sprays". A password spray is when a cybercriminal chooses a single password and tries it against everyone in their target organization. We strongly recommend that you use a password manager to reduce password reuse and improve complexity, but you may be wondering if it’s really worth the risk. Is it safe to store all of your passwords in one place? Can cybercriminals hack them? Are password managers a single point of failure?

Datadog on the Lifecycle of Threats and Vulnerabilities

The security industry is full of complex terminology like threat, vulnerability, and mitigations. Definitions matter as we design processes that scale. At Datadog, the Security Research functions are focused on detection and response to specific types of threats and vulnerabilities. Workload vulnerabilities, cloud control plane vulnerabilities, and even cloud service provider vulnerabilities. Each security finding based on specific risk indicators needs to be addressed differently at Datadog and in our communications to the broader community.