Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Managing Storage Access: Secure Cloud-native Development Series

Build secure cloud-native applications by avoiding the top five security pitfalls we lay out in our Secure Cloud-native Development Series. This blog is the third part of the series, and it will teach you how to secure cloud storage and handle access controls on S3 buckets. Each cloud provider has managed storage services that your organization is already probably utilizing.

SocketSleuth: Improving security testing for WebSocket applications

Today, we are proud to announce the beta version of SocketSleuth, our new Burp Suite extension for performing security testing against WebSocket-based applications. SocketSleuth was created out of our security research group to aid in our security research against applications that leverage WebSockets for communication.

More than 1 Million Callaway Customers at Risk From Security Vulnerability

Topgolf Callaway is a powerful golf company that offers modern golfing entertainment, as well as selling golf equipment in most areas of the world. The organization maintains online and in-person stores in many different countries and sells to millions of customers annually. With so much customer data exchanging hands through this company and its many retailers, everyone involved is at risk because of a recent security vulnerability.

Cybersecurity Secrets: How AI Keeps Us Safe

Hey there! Today, we're diving into the exciting world of cybersecurity and AI! 🚀 We're on a mission to find out how we can catch those sneaky digital bad guys. We did some cool research and found out that the reason people are going all-in on AI and machine learning is pretty interesting. It's because there aren't enough super-smart folks to do the job the old-fashioned way!

The 443 Podcast - Episode 258 - The Qakbot Takedown

This week on the podcast, we cover the FBI-lead, multinational takedown of the Qakbot botnet of over 700,000 victim devices. After that, we cover two android malware variants including one targeting victims in southeast Asia and another built by the Russian GRU. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Arctic Wolf Managed Security Awareness: The Mission

Arctic Wolf Managed Security Awareness® prepares your employees to recognize and neutralize social engineering attacks and human error—helping to end cyber risk at your organization. Fresh. Original. Effective. That is the content you can expect to see through Arctic Wolf Managed Security Awareness®.

Random but Memorable - Episode 11.3: Teach Bot Cybersecurity Recipes with Clint Bodungen

Can ChatGPT help us unlock new cyber skills? 🔓🤖 Tune in to find out, as we sit down with Clint Bodungen, author of the upcoming book: ChatGPT for Cybersecurity CookBook: Learn practical generative AI recipes to supercharge your cyber skills. On today's show, we discover how to harness AI and large language models for good, in order to release our full potential in real-world cybersecurity. 🦸‍♀️💥

Are You Protected from the 12 Most Exploited Vulnerabilities?

One of the most vital things to get right in application security is dependency management, and to achieve this, your suite of AppSec tools must be up to date. This means that your vulnerability scanning, detection, and remediation capabilities must be able to identify and address the newest and most exploited vulnerabilities. Do you know what these vulnerabilities are? Have you got them covered? With the help of some of the world’s leading cybersecurity authorities, you can be.

How SOC Analysts Can Keep Up With the Cybersecurity Landscape

Keeping up to date in any field can be challenging, but this ethos might not ring more true than in cybersecurity. The dynamic nature of the industry requires SOC analysts to always be on their toes with new and emerging threats across a constantly expanding attack surface. New threats and vulnerabilities can pop up on a nearly daily basis. Don’t let this discourage you because this is also what can make the role so satisfying!

SOC 2 Vs ISO 27001 Understanding the Similarities and Differences for an Integrated Approach

We are excited to announce that our latest webinar, “SOC 2 Vs ISO 27001: Understanding the Similarities and Differences for an Integrated Approach,” is now available on VISTA InfoSec’s YouTube channel. In this insightful session, our Director, Mr. Narendra Sahoo, delves into the key components of SOC 2 and ISO 27001, two globally recognized information security standards. The webinar covers a range of topics including.