Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Advanced attacks: EDR alone is not sufficient

Your best defense against advanced attacks is your network. SOC teams need comprehensive network data to defend against attacks. Corelight combines industry-leading Zeek network metadata, multi-layered detections, packet capture (PCAP), and file analysis (YARA) for the best approach to network-driven defense. Disrupt attacks, address gaps within your security stack, and reduce risk to your organization with Corelight's NDR solution.

The Downfall of XSS Forum

On July 23rd the notorious Russian-language hacking forum XSS.is was seized by French law enforcement agencies. Interestingly, just a few hours before the takedown, Cyberint, now a Check Point Company researchers were informed by “Loki,” a well-known moderator on BreachForums, that one of XSS’s admins had allegedly been arrested by the French. This follows a series of actions by French authorities, who have arrested BreachForums admins over the past few months.

SharePoint "ToolShell" zero day

Hats off to the great work the community and industry has done regarding the “ToolShell” attack against Microsoft’s On-Premise SharePoint servers. The goal of this article is to build on that great work and help Sumo Logic customers with on-prem SharePoint servers investigate and identify evidence within their environments.

ISO 27001 for healthcare companies: Benefits and implementation steps

ISO 27001 is a widely used standard for protecting the security of organizations across sectors and their data through comprehensive controls. While it’s beneficial for virtually any industry, organizations in the healthcare sector often find it especially valuable. ‍ This is because they’re often subject to extensive but vaguely defined regulations, and ISO 27001 provides the structured approach to compliance they need.

Backup Guide For Jira Automation Rules

It’s no news that Jira Automation Rules (JAR) sit at the center of how teams choose to streamline work. They triage requests and escalate incidents. At the same time, they keep systems running smoothly without requiring human intervention. For teams managing ITSM, DevOps, and cross-functional service operations, these rules are operational logic with many conveniences.

What You Need to Know about the Radiology Associates of Richmond Data Breach

Founded by Dr. Daniel Talley in 1905, the Radiology Associates of Richmond is one of America's oldest private radiology practices. RAR has since been at the forefront of advanced diagnostic, interventional services, and medical imaging. The institution spans seven hospitals and four outpatient centers in central Virginia. RAR has 62 board-certified radiologists, and the practice specializes in breast imaging, neuroradiology, and vascular interventions.

What is Data Poisoning? Types, Impact, & Best Practices

Data poisoning is a type of cyberattack where malicious actors deliberately manipulate or corrupt datasets meant for training machine learning models, especially large language models (LLMs). Tampering parts of a raw data set with an incorrect, often duplicitous one can negatively impact the result in various ways. Fundamentally, it aims to alter how AI models learn information so that the output is flawed.

Malware vs Spyware: Types, Risks, and Differences

Let’s talk about Malware vs spyware. They might sound similar, but they pose different kinds of threats, and both can seriously compromise your privacy and security. Both have a long history of causing chaos for businesses and individuals, but with the right knowledge, knowing how to spot malware vs spyware will increase your chances of preventing these kinds of cyberattacks before they ruin your device or compromise your data.

Microsoft Kills the Blue Screen of Death After 40 Years: Meet the New Black Screen of Death

Microsoft just made history. But not the kind you’re used to. For nearly four decades, the Blue Screen of Death (BSOD) haunted Windows users. One minute you’re sipping coffee. Next, your screen goes blue with a sad emoji and cryptic codes. However, Microsoft has now officially pulled the plug on this iconic crash screen.