Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

OpenSSH regreSSHion Vulnerability - The 443 Podcast - Episode 296

This week on #the443podcast, Corey Nachreiner and Marc Laliberte cover OpenSSH's recent critical vulnerability and what it means for systems administrators. Before that, we discuss the CDK Global ransomware attack impacting car dealerships across the U.S., a Korean internet service provider delivering malware to their customers, and a takeover of a popular JavaScript library gone hostile.

Defense Supply Chain Data Security

The defense supply chain is a complex network of partners that sell, manufacture, and distribute services or products to defense agencies worldwide. It is made up of both major corporations and smaller sub-suppliers. Each country has its own network of supply chain partners, including manufacturers, software, services and logistics providers that deliver products and services for military materiel applications.

MDR for MSPs: the key to strengthening your portfolio and protecting your customers

Managed service providers (MSPs) are key players in enterprise security, providing critical security services for customers who often lack in-house teams to manage them. However, the cyberthreat landscape is growing increasingly complex and challenging, even for these experts.

Uncover the Power of ThreatQ Platform: A Comprehensive Analysis

In the ever-evolving landscape of cybersecurity, organizations face a growing number of sophisticated threats. To stay ahead, they must leverage advanced threat intelligence solutions that allow organizations to not only provide comprehensive insights but also empower them to act swiftly and decisively against a wide variety of threats and vulnerabilities. Enter ThreatQuotient, a leading player in the digital threat intelligence management space.

Polyfill.io Supply Chain Attack: Malicious JavaScript Injection Puts Over 100k Websites At Risk

Polyfill.io helps web developers achieve cross-browser compatibility by automatically managing necessary polyfills. By adding a script tag to their HTML, developers can ensure that features like JavaScript functions, HTML5 elements, and various APIs work across different browsers. Originally developed by Andrew Betts, Polyfill.io injects JavaScript polyfill libraries based on the user agent or other characteristics, streamlining code maintenance.

Securing AI-Enhanced Applications: Zenity's Role in Low-Code/No-Code Development

The rapid rise of low-code and no-code platforms has democratized application development, enabling even non-technical business users to swiftly create critical business applications. However, this accessibility brings new security challenges, particularly with the integration of AI technologies such as copilots, which are used to automate tasks and enhance functionality within these platforms. Zenity enhances the security of these AI-integrated environments by managing and securing AI copilots.

Why and how to perform Telegram monitoring to protect your business

For threat actors, the Telegram app, which emphasizes user privacy, has become a favored hangout. As Dark Reading notes, “The cybercrime ecosystem now not only includes private communications platforms like I2P and Tor but also reaches across clear websites and Telegram channels.” Likewise, the U.S.

How to build and launch an efficient and flexible blockchain payments solution

Your organization has identified a business and revenue opportunity to incorporate blockchain into your offering (or maybe launch a new product line that involves digital assets), and now you’re ready to implement this technology into a product offering. The question now is, “Where do we begin?” Ideally, your team will be working with partners and products that can easily fit into your existing tech stack and operational workflows.