Automate’s orchestration capabilities help IT and security organizations scale, gain efficiencies, and reduce errors with complex manual and repetitive tasks.
Key insights and defense strategies were shared at Blue Team Con 2024 in Chicago, where defenders gathered to advance their skills for fighting today’s toughest threats.
Administrators can perform all typical Windows registry operations using either the old-good regedit user interface or the reg.exe utility. But there is another option — PowerShell. PowerShell can dramatically streamline the work of managing the registry, either on the local machine or remotely.
Advanced Persistent Threat (APT) groups have long been key players in global cyber espionage, and in 2024, a Chinese-linked threat cluster known as "Crimson Palace" continues to demonstrate its effectiveness. This collective of three distinct APT units has managed to breach multiple organizations across Asia, including a prominent government agency in Southeast Asia, proving their ability to evade detection and extract sensitive information.
The critical CVE-2024-40711 vulnerability in Veeam Backup & Replication (VBR) is drawing attention from security researchers and ransomware groups alike. Discovered by Florian Hauser from Code White, this flaw allows attackers to take full control of enterprise systems, posing a significant threat to the integrity of data backup infrastructures. With ransomware groups historically targeting Veeam vulnerabilities, CVE-2024-40711 could soon become a valuable tool for cybercriminals.
Microsoft Azure is a cloud computing platform with more than 200 products and cloud services, including IaaS, PaaS, and Saas! These can be used for building, deploying, or managing applications and services. Over 95% of Fortune 500 businesses rely on and trust Azure. For what?
Organizations’ security operations (SecOps) programs are under increased pressure due to more sophisticated threats, a continually expanding attack surface, and strained internal resources. To help solve these challenges, BlueVoyant MDR delivers 24x7 threat monitoring, detection, hunting, and response powered by advanced automation and human expertise.
This week on the podcast, Corey Nachreiner and Marc Laliberte discuss guidance published by the US White House Office of the National Cyber Director that lays out a roadmap for addressing key security concerns in the BGP routing protocol. Before that, Corey and Marc cover a security research post from Jfrog detailing a new python package hijacking method under active exploitation as well as an analysis of the Microsoft Windows Wi-Fi driver remote code execution vulnerability patched last June.
Picture this: You’ve just settled in at home after a long day, ready to relax, when suddenly your phone buzzes. It’s a notification about a failed build in your latest project. Your heart sinks. Your mind starts racing to connect the dots… What went wrong? Where is it broken? There’s usually no one immediately available to answer these questions, and you know it will require a large manual effort to get to the bottom of the issue.
When it comes to software supply chain security, we all do everything we can to prevent insecure software from being released into production. Hence we see software supply chain security shifting left to discover potential threats as early as possible in the software development lifecycle. But what happens when vulnerabilities are only discovered after an application has been distributed to its operating environment?