Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

All the Proxy(Not)Shells

On September 28th it was disclosed by GTSC that there was a possible new zero day being abused in the wild beginning in early August. Although this campaign looked very similar to the previously abused vulnerability in Microsoft Exchange, dubbed ProxyShell at the time, comprising 3 CVEs (CVE-2021-34473, CVE-2021-34523 and CVE-2021-31207) that when combined enabled an adversary to gain remote access to an Exchange PowerShell session that may be abused.

Post-Quantum Cryptography & Preparing for Post-Quantum Encryption (PQE)

Quantum computing is an emerging technology that, in due time, will enable amazing power for humanity. With good comes bad. Bad actors are likely to harness quantum computing to distrust, steal or cause harm — threatening our global ways of living and working. We must help federal agencies and commercial enterprises to build quantum safety and quantum resilience against a worst-case scenario. Fortunately, the threat is being recognized. On December 21, 2022, the U.S.

Wallarm - Addressing CISOs Priorities In 2023: Wallarm API Security Democast

Modern API security needs to be able to protect against modern challenges. Whether you are protecting brand-new APIs or legacy web apps, Wallarm provides key components to secure your business against emerging threats. Join Tim Ebbers, Field CTO, and Stepan Ilyin, Co-Founder, for a demo of the Wallarm platform, to learn more about the key components and recent feature enhancements.

How Houston-Based Businesses and Organizations Can Protect Themselves from Data Breaches

Earlier last year, Houston Daily reported that the Houston Health Department had a security breach that leaked around 10,000 COVID-19 patients' data. This caused a panic, and of course, the health department had to respond. At the same time, many businesses and organizations in the area also grew alert about the implications a data breach could have.

Best Safe Download Checker Tools to Protect Your Devices from Threats

In recent years, security professionals have seen a rise in unauthorized access over devices, the spread of malware, and system corruption. And while finding the root cause, most of the answers concluded with downloading and installing malicious files. When anyone downloads an infected file and doesn’t check its authenticity, the possibility of getting attacked increases. Whether it’s a personal system or an organizational device, you must check the file.

How to Have a More Professionally Rewarding Workplace with Automation

I love automation. Seriously, what could be more satisfying than tricking a machine into doing all the things you don’t want to do using only the power of your mind? Paying bills, brewing coffee, making appointments, ordering food… it’s like being Tom Sawyer without all the manipulation and questionable ethical choices.