Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Proactive Identity Security: Addressing Unmanaged Endpoint Risks

When an electrician comes to fix something in your house, you wouldn’t just hand over the keys and leave. Instead, you’d stay to supervise and ensure everything is done correctly. Similarly, unmanaged endpoints accessing sensitive corporate data, such as contractor laptops, personal computers and call center systems, require the same level of oversight.

From endpoint to XDR: Operationalize Microsoft Defender for Endpoint data in Elastic Security

Enhance your threat detection, investigation, and response by integrating Microsoft Defender for Endpoint data with Elastic Security. Many security teams often find it difficult to detect and respond to threats because of fragmented visibility and isolated endpoint data. This challenge led to the development of extended detection and response (XDR), which integrates endpoint insights with contextualized data from networks, cloud environments, and identity systems.

Integrating GitOps into your Security Operations

Security operations are evolving—and they have a lot to gain from the principles of modern software engineering. GitOps, a development-centric approach that leverages version control and automation, is now reshaping how security teams operate: with speed, consistency, and transparency.

Get More from Defender with WatchGuard Core MDR for Microsoft

Small and midsize businesses (SMBs) are increasingly becoming prime targets for cybercriminals, accounting for 46% of all cyber breaches impacting companies with fewer than 1,000 employees. With an alarming 30,000 small business websites compromised daily and the average user receiving 1.5 malicious emails, the reality is clear: it's not a matter of if your business will face a cyber threat, but when.

Lucid, the Phishing-as-a-Service Platform - The 443 Podcast - Episode 325

This week on the podcast, we discuss a recent threat intelligence report on the Chinese Phishing-as-a-Service platform Lucid. Before that, we cover the alleged Oracle Cloud breach before reviewing the Singapore Shared Responsibility Framework, designed to combat financial scams.

Github Actions Supply Chain Attacks - Episode 324 - The 443 Podcast

This week on, Corey and Marc discuss a recent cascading supply chain attack involving multiple Github actions workflows that nearly succeeded in compromising a popular Coinbase application. Before that, they discuss a novel way to download malware onto an endpoint by abusing a web browser's caching feature. Additionally, they cover an FBI alert on file converter malware scams.

#206 - The AI Threat Landscape Report w Eoin Wickens, Director of Threat Intelligence at HiddenLayer

On this episode of the Cybersecurity Defenders Podcast we dive into the AI Threat Landscape report with Eoin Wickens, Director of Threat Intelligence at HiddenLayer. Eoin specializes in AI security, threat research, and malware reverse engineering. Eoin has authored numerous articles on AI security, co-authored a book on cyber threat intelligence focusing on Cobalt Strike, and has spoken at conferences such as DEF CON AI Village, BSides San Francisco, LABScon, and 44CON. He also delivered the 2024 SCORED opening keynote.