Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Logging

Typosquatting 101: Types, Examples & Ways to Protect Yourself from Typosquatting Attacks

Typosquatting goes by many names: URL hijacking, domain mimicry and domain typo-squatting, to name a few. However, they all mean the same thing: malicious attackers register domain names similar to popular websites but with common typos and variations. Typosquatting aims to trick users who mistype the legitimate URL into visiting and using the fraudulent site. It is a widespread practice.

What Is SAML? SAML Authentication & Security Assertion Markup Language Explained

Authentication and authorization are two processes that play a significant role in any web application. These concepts ensure that only trusted individuals are granted access to the resources of the application. Plus, with all the web applications and services we use regularly, it is increasingly difficult to manage credentials for multiple user accounts. SAML technology provides a means for securely logging into multiple applications using a single set of credentials.

Leveling Up Security Operations with Risk-Based Alerting

In life, you get a lot of different alerts. Your bank may send emails or texts about normal account activities, like privacy notices, product updates, or account statements. It also sends alerts when someone fraudulently makes a purchase with your credit card. You can ignore most of the normal messages, but you need to pay attention to the fraud alerts. Security is the same way.

Hypothesis-Driven Hunting with the PEAK Framework

Picture yourself as a cyber detective, ready to uncover the hidden threats lurking in the shadows of your organization's network. Sounds exciting, right? Well, hypothesis-driven hunting is all about channeling your inner Hercule Poirot to stay one step ahead of adversaries working against you. The PEAK threat hunting framework identifies three primary types of hunts: In this post, we’re going to look at hypothesis-driven hunting in detail.

Password Spraying Today: Everything To Know To Prevent Password Spraying Attacks

Password spraying is a cyber threat that exploits weak passwords in order to easily compromise user accounts. That means it is critical to enforce strict access controls when authenticating users into a system. This article provides an overview of password spraying attacks, including how they work and a few real-world examples of these attacks. I’ll also look at how these attacks impact businesses, along with mechanisms to detect and prevent them.

Splunk Becomes a TISAX Participant

Co-author: Matthias Maier, Product Marketing Director at Splunk. With increasing focus on implementing security standards within the digital supply chain, national and industry-specific certifications have become increasingly important. Today, we are excited to announce that Splunk Services Germany GmbH has become a TISAX participant. The alignment with TISAX requirements demonstrates Splunk’s continued commitment to support the heightened security expectations in the automotive industry.

The Devo Platform: An Integrated SaaS SIEM | SOAR | UEBA | AI Solution

People or AI? YES. Is your organization equipped to handle today's and tomorrow’s threats with your existing security team or with artificial intelligence? The answer is YES. Yes, to both of them. Yes, to all of it. Whether it’s dealing with the constantly evolving threatscape or the shortage of affordable, available cyber professionals, leadership needs to fill the gap with people and AI. It’s not either/or.