Impact of modern ransomware on manufacturing networks

Manufacturing facilities employ assembly lines, material handling systems, motors, and furnaces that all require big physical machines. Innovative trends in the manufacturing industry and the advancement of operational technology have also meant introducing computers across operation and production systems.

Key insights from the Conti ransomware playbook leak: establishing a foothold

Following a leak of a cache of documents relating to the Conti ransomware group by one of its own affiliates, in the first of a two-part blog series we analyse some of the main findings and outline steps to mitigate against Conti and other ransomware variants.

Securing endpoints, part 1: Ensuring hackers don't manipulate your browsers to carry out attacks

In a world of automation, computers and the data on them have become the backbone of many organizations. But data is a double-edged sword. It can be leveraged by organizations to improve operations, but in the wrong hands, it can be a deadly weapon for hackers. So how do organizations ensure their data is safe?

How to detect security threats in your systems' Linux processes

Almost all tasks within a Linux system, whether it’s an application, system daemon, or certain types of user activity, are executed by one or more processes . This means that monitoring processes is key to detecting potentially malicious activity in your systems, such as the creation of unexpected web shells or other utilities.

Veracode Software Composition Analysis Cited as a Strong Performer by an Independent Research Firm

Veracode, the largest global provider of application security testing (AST) solutions, has been recognized as a Strong Performer in The Forrester WaveTM: Software Composition Analysis, Q3 2021 by Forrester Research, a leading global research and advisory firm.

The Cost of a Data Breach Report: Key Highlights

IBM’s Cost of a Data Breach Report 2021 analyzed 537 real breaches and conducted nearly 3,500 interviews to uncover the true cost of a data breach in 2020. The publication covers initial attack vectors, how long it took organizations to discover and contain braces, as well as the effects that incident response efforts and artificial intelligence have on mitigating breach costs.

Announcing new Cloud Security Monitoring & Analytics apps to surface the most relevant security insights from AWS GuardDuty, WAF, and Security Hub data

Given today’s evolving multi-cloud dynamics and increasingly active threat landscapes, security teams have a greater need for integrated and scalable monitoring that provides meaningful real-time insights into the state of organizational security posture. As organizations adopt cloud-first strategies, cybercriminals have taken note and continuously evolve their tactics to gain access to valuable cloud data.

Veracode Ranked as a Strong Performer in Forrester Wave Software Composition Analysis Report

Veracode has been recognized in a report Forrester Research recently released, The Forrester Wave™: Software Composition Analysis, Q3 2021 . The report helps security professionals select a software composition analysis (SCA) vendor that best fits their needs. The report, which evaluates 10 SCA vendors against 37 criteria, ranks Veracode as a strong performer.

Cybersecurity experts are currently drowning in ransomware attacks

U.S. President Joe Biden is under pressure to take a stand against a relentless pace of cybersecurity attacks. Russian-speaking hackers have claimed accountability for a recent ransomware assault on IT management software provider Kaseya VSA. The group of Russian threat actors also referred to as the Revil Group, launched a bombshell supply-chain hit during the weekend of July 4th, 2021 against Kaseya VSA and multiple managed service providers.