Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Clearing the Fog of War - A critical analysis of recent energy sector cyberattacks in Denmark and Ukraine

The “fog of war” is a military term used to denote the uncertainty and confusion experienced on the battlefield. During periods of growing geopolitical conflict, it becomes increasingly hard to keep pace with new developments.

How To Prevent Firewall Breaches (The 2024 Guide)

Properly configured firewalls are vital in any comprehensive cybersecurity strategy. However, even the most robust configurations can be vulnerable to exploitation by attackers. No single security measure can offer absolute protection against all cyber threats and data security risks. To mitigate these risks, it’s crucial to understand how cybercriminals exploit firewall vulnerabilities.

MSS: (DisableIPSourceRouting) IP source routing protection level (protect against packet spoofing)

Optimally configuring “DisableIPSourceRouting” parameter enhances security by mitigating the risk of denial-of-service (DOS) attacks through packet spoofing. In such attacks, the goal is to inundate the target with high volumes of traffic, and using spoofed IP addresses makes it challenging to filter and identify the true source of the attack. Server hardening can be arduous. CSH by CalCom automates the process, learning your network to eliminate the need for testing.

Know Thyself and Thy Network

The shifting sands of IT make the adage "you never know it all" ever more true as time goes by. I recall days when it felt like you could click through every major directory of Yahoo and know a little something about everything. I was a young man with a voracious reading appetite and an active imagination – both of which were thoroughly outpaced by the growth of the internet and my own developing maturity.

Fuzzing and Bypassing the AWS WAF

The Sysdig Threat Research Team discovered techniques that allowed the AWS WAF to be bypassed using a specialized DOM event. Web Application Firewalls (WAFs) serve as the first line of defense for your web applications, acting as a filter between your application and incoming web traffic to protect against unauthorized or malicious activity. In this blog post, we will analyze one of the most commonly used Web Application Firewalls, the AWS WAF, and explain ways that allowed it to be bypassed.

Trustwave Transfers ModSecurity Custodianship to the Open Worldwide Application Security Project (OWASP)

After serving as its steward for over a decade, Trustwave has agreed to transfer the reins of the renowned open-source web application firewall (WAF) engine, ModSecurity, to the Open Worldwide Application Security Project (OWASP). This landmark move promises to inject fresh energy and perspectives into the project, ensuring its continued evolution as a vital line of defense for countless websites worldwide.

Demo Tuesday

How can federal agencies possibly comply with the HUNDREDS of complex specifications in the DISA STIG compliance checklists? Join Mike Lossmann and Federal Technical Solutions Engineer Sean Deveci for this week’s Demo Tuesday to learn how a network digital twin can streamline your federal network compliance and give you full confidence heading into an audit.

Top Network Firewall Security for Cyber Threats

Cyber threats are getting smarter and are going after businesses of all kinds. Your first line of defense against these threats should be network firewall security, which protects your private data and systems. By filtering data based on set security rules, firewalls create a wall between trusted internal networks and untrusted external ones. A study from Cybersecurity Ventures says that by 2025, cybercrime will cost the world $10.5 trillion every year.

How Does PCI DSS 4.0 Affect Web Application Firewalls?

The payment industry is bracing for the transition to Payment Card Industry Data Security Standard (PCI DSS) 4.0, heralding significant changes in cybersecurity practices. As we approach the implementation of this revised standard, a critical focal point emerges: the role and new mandate of web application firewalls (WAFs) in ensuring compliance.