Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Random but Memorable - Episode 11.8: Wrong Movie Airplane Tampering with Ken Munro

We're taking a trip to the movies this episode.🍿 With people speaking with ChatGPT for hours, are we bringing 2013’s sci-fi movie Her closer to reality? And can we really hack airplanes like that iconic scene in Die Hard 2? We unpack all that and more. We're also excited to welcome back friend-of-the-show, Ken Munro, from Pen Test Partners. Ken shares his latest wild discoveries pen-testing airplane security during the pandemic.🔒✈️

See Falcon Data Protection in Action

Adversaries are after your sensitive data. CrowdStrike Falcon® Data Protection, part of the powerful CrowdStrike Falcon® platform, takes a modern approach to securing your enterprise data from adversaries. By combining content with context, see how Falcon Data Protection provides deep real-time visibility into what is happening with your sensitive data as they move from the source to the destination.

Unleashing the Power of Technology: How AI is the Next Big Leap! || Razorthorn Security

In an ever-evolving world of technology, we often witness the remarkable phenomenon of exponential growth in power and capability. Join us as we explore this fascinating journey of technological advancement, from the skeptics who doubted the significance of email to the In an ever-evolving world of technology, we often witness the remarkable phenomenon of exponential growth in power and capability. Join us as we explore this fascinating journey of technological advancement, from the skeptics who doubted the significance of email to the unstoppable rise of AI.

CVE-2023-38547 & CVE-2023-38548: Two Critical Vulnerabilities in Veeam ONE

On November 6, 2023, Veeam published security hotfixes for two critical-severity vulnerabilities impacting Veeam ONE. At this time, Arctic Wolf has not identified active exploitation of either vulnerability, nor a published proof of concept (PoC) exploit. Although threat actors have not historically targeted Veeam ONE products, obtaining RCE on the monitoring and analytics platform will likely increase the potential for threat actors to create a working PoC exploit and attempt exploitation.

Monitor expiration events from Azure Key Vault

For customers using Azure Key Vault—which helps them safeguard sensitive keys and secrets used by applications and services hosted on Azure—it can be challenging to determine when the resources in their Key Vault(s) are about to expire. Invalid keys and secrets can disrupt your day-to-day workflows by causing application downtime, holding up incident investigations, invalidating compliance, slowing down the development of new features, and more.

Collect Google Cloud Armor logs with Datadog

As the internet continues to evolve, cybersecurity threats—particularly Distributed Denial of Service (DDoS) attacks—are an increasingly significant concern for organizations. In this post, we’ll look at how you can use Datadog to collect Google Cloud Armor (GCA) logs and detect and respond to potential DDoS attacks in real-time. But first, we’ll briefly cover what DDoS attacks are and how they work.

What is Adaptive Security (Definition and Implementation)

Adaptive security is an approach to cybersecurity that helps your Security Operations Center (SOC) quickly adapt to the latest threats. By implementing adaptive security, your organization can evaluate and analyze behaviors and events in real-time to take preventative action before a breach.

CrowdStrike Falcon Go Demo

Next-generation security is simplified with CrowdStrike Falcon Go. Purpose-built for small and medium businesses, Falcon Go replaces your legacy antivirus with award winning, AI-powered security trusted by thousands of businesses. Falcon Go's simple operation, management, and deployment enables your business to stop breaches. Next-generation security for small and medium businesses: that's Falcon Go.

Scalpers Force Barbie Collectors to Pay up to 1,200% More for Stevie Nicks Doll

Scalpers aren’t just interested in snagging the final Yeezy drops, the newest Air Jordans or tickets to see Taylor Swift on tour. They’ve also been saying “Hey, Barbie” to the latest Mattel collaboration with rock icon and Barbie enthusiast Stevie Nicks. Evidence gathered by Netacea suggests that scalper bots were involved when pre-orders for the limited-edition Stevie Nicks Barbie, unveiled by the Fleetwood Mac legend during a recent concert, sold out almost immediately.

3 Best Third-Party Risk Management Software Solutions in 2023

From U.S. executive orders to cyber regulations, prominent cybersecurity policies are increasing their inclusion of Third-Party Risk Management standards, and for good reason - every organization, no matter what size, is impacted by third-party risks. If you're looking for a TPRM software solution to enhance the efficiency of your TPRM program, this post will help you evaluate the top contenders in the market.