Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Weekly Cybersecurity Recap May 19

Major data breaches seem to be occurring more and more frequently, and we have some huge names on the list of impacted companies this week, including the US Government, Toyota, and Intel. We were also concerned with services in our hospitals and our schools being breached, giving up patient, student, and teacher data in the process through the breach of companies like SchoolDude and NextGen Healthcare.

Teleport Team

Teleport Team is the latest SaaS offering from Teleport. Teleport Team is designed to secure your infrastructure with safe, short-lived, and secretless access. It's an ideal solution for startups, rapidly expanding businesses, or even hobbyists who want to fortify their infrastructure without the hassle of deploying, updating, or maintaining a Teleport Cluster. Starting at just $15 per monthly active user with 50 included protected resources.

Code Signing with USB Tokens: A Comprehensive Guide

USB, hardware, or cryptographic tokens are portable devices that securely store cryptographic keys. These tokens typically connect to a computer or other devices via USB. USB tokens offer a compact and convenient solution for storing and protecting sensitive cryptographic keys, certificates, and other credentials. They are designed to provide strong encryption, tamper-resistant hardware, and secure key storage.

Setting up the Docker image scan GitHub Action

Nowadays, the final product of most Git repositories is a Docker image, that is then used in a Kubernetes deployment. With security being a hot topic now (and for good reasons), it would be scanning the Docker images you create in the CI is vital. In this piece, I’ll use GitHub Actions to build Docker images and then scan them for security vulnerabilities. The Docker image built in the CI is also pushed to GitHub’s Docker registry.

How a Password Manager Enhances Productivity

People who don’t have a password manager often struggle with forgetting their passwords and having to reset them when attempting to log in to their online accounts. This is frustrating, time-consuming and leads to a loss in productivity. A password manager enhances your productivity since it remembers passwords for you, aids you in generating strong passwords and autofills your login credentials, saving you time to focus on more important tasks.

Cloud Threats Memo: More Details on Long-Lasting Campaigns Targeting Eastern Europe

In a previous memo, I mentioned the discovery, made by researchers at Kaspersky, of an active campaign carried out by an advanced threat actor since 2021, targeting multiple organizations in the regions of Donetsk, Lugansk, and Crimea. One of the noteworthy aspects of this campaign was undoubtedly the usage of a new backdoor, called PowerMagic, characterized by the exploitation of the popular cloud storage services, Dropbox and OneDrive, as the command and control infrastructure.

Discovering and Managing Sensitive Information in Microsoft Repositories

If you use Microsoft SharePoint, OneDrive, or Exchange Online to store and share your business content, you may be wondering how to protect it from unauthorized access, data breaches, or compliance violations. That's where Egnyte comes in. As a source-agnostic data governance and collaboration solution, Egnyte integrates with Microsoft Office Online, Office Mobile, and SharePoint Online to provide a seamless user experience and powerful workflows for opening, editing, sharing, and securing files.

UTMStack Unveils Ground-breaking Artificial Intelligence to Revolutionize Cybersecurity Operations

Doral, Florida UTMStack, a leading innovator in cybersecurity solutions, has announced a significant breakthrough in the field of cybersecurity – an Artificial Intelligence (AI) system that performs the job of a security analyst, promising to transform cybersecurity practices forever.

Take action now to avoid BianLian ransomware attacks, US Government warns organisations

The US Cybersecurity and Infrastructure Security Agency (CISA), FBI, and others have issued a joint alert, advising organisations of the steps they should take to mitigate the threat posed by BianLian ransomware attacks. BianLian, which has been targeting different industry sectors since June 2022, is a ransomware developer, deployer and data extortion group which has predominantly targeted enterprises.