Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Endpoint Security

The 443 Podcast - Episode 253 - What Is Same-Origin Policy? Replay

This week we look back to an episode that originally aired in May 2021 where we remember a Def Con legend then dive in to two web browsing security acronyms. Keep an eye out later this week as we come to you from this year's Black Hat and Def Con cybersecurity conferences! You can view more information on the CISA guidance as well as Blaze Lab's full blog post at the links below: The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

The dark web : what threat does this pose to your company?

There is a welter of websites that are not indexed by search engines on the dark web, making it an ideal space to exchange all kinds of illegal content or products. This dark part of the web actually represents just 0.1% of the deep web. So how come something so small can be so dangerous for organizations and users?

Webinar: Insuring Your Digital Future - Understanding Cyber Insurance Requirements

With cyber threats becoming increasingly common, businesses of all sizes must be prepared to protect themselves from potential data breaches and other cyber attacks. Cyber insurance can be an important tool for managing these risks, but understanding the requirements of cyber insurance can be challenging. These requirements typically vary depending on the specific policy and insurer, but they often include factors such as the size and type of business, the industry in which the business operates, and the risk level associated with its IT infrastructure and data. In addition to meeting these eligibility requirements, businesses may need to comply with certain cybersecurity protocols and standards to maintain their coverage. This webinar will discuss these cyber insurance requirements and offer potential solutions for protecting your business from data breaches and other cyber threats.

5 ways to prevent phishing from ruining your summer vacation

During the summer months, when employees and customers are away on vacation, things usually slow down for businesses. But for cybercriminals, the opposite is true because they are busy taking advantage of minimal staffing levels in companies during the vacation period to launch complex attacks. The U.S. Federal Cybersecurity and Infrastructure Security Agency (CISA), warns that the risk of being hit by a cyberattacks rises over the holidays and summer vacation-themed phishing attacks gain momentum.

Solving False Positive EDR Alerts

Endpoint Detection and Response (EDR) alerts are what happens when an EDR system decides that event data from an agent installed on an endpoint, or several endpoints, shows a potential threat. This doesn’t mean that every EDR alert is a malicious event in progress. Many are “false positives” or malicious behaviour that is actually not a threat.

4 tips on how to prevent MFA fatigue in your company

Implementing multi-factor authentication (MFA) is undoubtedly the best way to protect your company and its data. However, when it comes to identity management, both users and administrators tend to demand a balance between efficiency, convenience, and security, all at the same time. It is a difficult challenge, but one that can be met. This is mainly because users may see MFA as a barrier that creates friction during use that can slow down productivity.

The 443 Podcast - Episode 252 - Qakbot Qacktivity

This week on the podcast, we cover the latest evolutions of the decade-old Qakbot malware including changes in how attackers deliver it. After that, we give an update on the SEC's new rules around mandatory security disclosure. We then end by reviewing CISA's analysis of Risk and Vulnerability Assessments they completed for their constituents in 2022.

Virtual Patching: the solution to Windows 10 EOL

Windows 10, which is still the most widely deployed operating system on desktops, has announced end of support for October 14, 2025. The current version, 22H2, will be the last version of Windows 10, which means that Microsoft will stop providing support and security updates for that particular version and any vulnerabilities discovered after the EOL (End of Life) date will not be fixed by Microsoft, leaving your operating system, and that of your customers, exposed to security risks.