Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Is Your Hospital Sharing Patient Data with Facebook? A Guide for Security and Privacy Teams

Recent lawsuits have revealed a critical privacy concern for healthcare providers – the sharing of patient data with Facebook through tracking pixels. We wrote this article to help your security and privacy teams assess their risk, identify key stakeholders, and understand the urgency of this issue.

Bumblebee Malware is back with evolving tactics: How EventLog Analyzer can help protect your organization

In a surprising development, Bumblebee Malware (a popular malware downloader) has resurfaced with an approach that was believed to be long gone: VBA macro-enabled documents. This comes just four months after Europol dismantled various trick bots—including Bumblebee, IcedId, Pikabot, TrickBot and systemBC—during a crackdown called Operation Endgame.

How to Perform Hyper-V Storage Migration: A Step-by-Step Guide by NAKIVO

Hyper-V Storage Migration is Microsoft’s technology for moving the storage of virtual machines (VM) from one location to another without resulting in compatibility issues. Moreover, Hyper-V Storage Migration can be performed on live VMs, allowing you to avoid any downtime and continue business operations as usual. Watch this video walkthrough on how to use Hyper-V Manager and PowerShell to launch and configure Hyper-V Storage Migration.

Cloud Trends : How They're Reshaping Cybersecurity

Cloud adoption is accelerating, but with it comes new security challenges. In this video, we discuss: The rise of multi-cloud and hybrid cloud strategies. Key security concerns like visibility gaps and the shared responsibility model. How to stay secure while trusting—and verifying—your cloud provider. Takeaways: Understand cloud trends, security risks, and your role in protecting your workloads.

The Role of the CISO Will Become the Least Desirable in Business | 2025 Cybersecurity Predictions

The CISO is a human-centric role. The biggest issues that CISOs typically encounter are not technical problems but human and governance problems. In 2025, we predict that as regulatory and policy demands for CISOs grow, including requirements for the CISO to personally certify the cybersecurity integrity of their business, the CISO role will become the least desirable in business.

See Falcon Cloud Security in Action

Cloud exploitation grew 95% over the past year, with adversaries becoming even more focused and persistent. Watch how Falcon Cloud Security stops breaches with truly unified agent and agentless protection, from endpoint to cloud. CrowdStrike Falcon Cloud Security: ► Stop cloud breaches and consolidate disjointed point products with the world’s only CNAPP built on a unified agent and agentless approach to cloud security for complete visibility and protection.

Falcon Cloud Security Application Security Posture Management: Demo Drill Down

Protecting your software from adversaries requires a precise understanding of production. Watch how Falcon ASPM empowers security teams to stop adversaries from breaching their custom applications. CrowdStrike Falcon ASPM: Prioritize and mitigate cloud threats with unmatched application visibility and business context. Subscribe and Stay Updated: ► Don't miss out on more exciting content! Subscribe to our channel for the latest updates, case studies, and more from the world of cybersecurity. Hit the bell icon to receive notifications whenever we post new videos.

Exploited! Kerio Control's HTTP Response Splitting Vulnerability (CVE-2024-52875)

CVE-2024-52875 is an HTTP Response Splitting vulnerability in Kerio Control. This flaw allows an attacker to inject malicious input into HTTP response headers by introducing carriage return (\r) and line feed (\n) characters. Such manipulation can cause the server to send multiple HTTP responses instead of one, leading to various attacks.