Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The 443 Podcast Episode 202 - Rolling PWN

This week on the podcast we cover the latest in car hacking research, this time targeting vulnerabilities in remote keyless entry. We then dive in to Microsoft's latest research on Adversary in the Middle (AitM) attacks and end with key findings from the latest WatchGuard Threat Lab quarterly Internet Security Report. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

The Complete Guide: Migrating from LastPass to Keeper

Businesses looking for a LastPass alternative should find a solution that is more than just a password manager. Keeper Security is the ideal password management solution for growing small and medium-sized businesses (SMB). We offer tools for password management, secrets management, remote connection and other security features to protect you and your team. Fortunately, migrating over to Keeper has never been easier.

Navigating the Challenges of Cross-Cluster Migration of Kubernetes Workloads with CloudCasa

Cross-cluster migration of Kubernetes workloads continues to be challenging since workloads are isolated from each other by design. There are several reasons why you may want to separate your workloads, whether it is to reduce complexity or to have the cluster closer to the user base. However, this can be complex as Kubernetes has many components.

Phishing: Better Proxy than Story

In the last phishing blog we discussed how modern phishing works on the frontend. Read on to find out how threat actors can easily find and authenticate a suitable domain by modifying both Gophish and Evilginx to evade security controls In the last phishing blog we discussed how modern phishing works on the frontend. Here we go behind the scenes to dissect how to configure and authenticate a good domain for your phishing campaign using Apache as Reverse Proxy. Excited? You caught the hook, read on!

New and Sophisticated Cyber Threats: CVM Advising on Protection

Chuck Veth, CEO of CVM, and his team, advise leaders in manufacturing, finance, education, pharmaceuticals, food service, and more on solutions to protect their networks. Their customers trust that they have their best interest at heart and that when they advise them, it's advising them as mentors and not just as salespeople. In today's world, your network is vulnerable to people all around the globe. And they're patient, slowly finding more and more information, so when they actually perform the attack, it's debilitating. It's not just a bunch of encrypted files.
Featured Post

Three Hard Truths About Organizational Cybersecurity

In recent years, many business and IT decision-makers have missed key opportunities when it comes to essential organizational cybersecurity practices - from not properly segmenting networks and not deactivating unused accounts (or protecting them with multi-factor authentication), to not implementing proper password security controls. As a result, organizations are increasingly falling victim to costly and damaging data breaches, replete with the associated disruption to operations and issues with both legal and public relations departments.

Top 5 NPM Vulnerability Scanners

The world of software development has been rocked by JavaScript. With nearly every modern web app making extensive use of JavaScript on the front end. And with JavaScript’s popularity also on the backend with Node.js, it’s hardly surprising that new vulnerabilities are emerging daily, given the sheer volume of open source project dependencies being used by JavaScript developers. The culprit? It all comes down to the free-ware NPM packages installed within Node.js.