Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Counting the seconds: a method of showing automation value

Automation has revolutionized the way cybersecurity functions. Not only has it led to significant time savings, but it has also improved the consistency and accuracy of various processes. Here, we will discuss how to effectively record the time saved from automation to demonstrate its value. Tines offers great utilities to easily record the time an analyst has saved by automating manual, repetitive tasks over the course of a day, right down to the second.

Vault Recovery Phrase

Keeper maintains the most security certifications in the industry and is committed to continually evolving our security methods in order to protect your data. As a result, we are upgrading our account recovery system with a new recovery phrase method. A recovery phrase is a simple, auto-generated set of 24-words that can be used to restore access to your Keeper Vault in the event you forget your Master Password.

Introducing 24-Word Recovery Phrases - The Most Secure Recovery Method

Keeper Security continually invests in new, more robust technologies to counter emerging threats. That’s why Keeper is upgrading our account recovery process via a new and more secure 24-word “recovery phrase” feature, replacing the current user-customizable security question-and-answer recovery method.

New .NET Malware "WhiteSnake" Targets Python Developers, Uses Tor for C&C Communication

The JFrog Security Research team recently discovered a new malware payload in the PyPI repository, written in C#. This is uncommon since PyPI is primarily a repository for Python packages, and its codebase consists mostly of Python code, or natively compiled libraries used by Python programs. This finding raised our concerns about the potential for cross-language malware attacks.

Software Supply Chain Security at RSA Conference 2023

The risk of supply chain attacks increases as more companies rely on third-party vendors and suppliers for critical services and products. Supply chain attacks have become increasingly prominent in recent years. In 2022, for instance, supply chain attacks surpassed the number of malware-based attacks by 40%.

Hackers Backdoor to Microsoft SQL Servers using Trigona ransomware

South Korean cyber security organisation AhnLab has identified a breach in Microsoft SQL servers allowing deployment of Trigona ransomware. The attacks were threat actors using brute-force or dictionary attacks with obtained or guessed credentials to infiltrate externally accessible MS-SQL servers.

Coming soon: Save & fill passkeys with 1Password in the browser

Starting this summer, 1Password customers will be able to store, manage, and use passkeys to access their online accounts through 1Password in the browser. With 1Password, you can access your passkeys on any device and seamlessly sign in. Passkeys are the future of authentication: they're both safer, and easier to use than passwords.

More than 256,000 Consumers Put at Risk By the Consumer Financial Protection Bureau

The Consumer Financial Protection Bureau (CFPB) is a government agency that's tasked with protecting consumers from financial institutions. The agency mostly works to prevent companies from charging outrageous fees and surcharges to customers, but it helps with monitoring how consumer data is being used by companies as well.

Another Perspective on ChatGPT's Social Engineering Potential

We’ve had occasion to write about ChatGPT’s potential for malign use in social engineering, both in the generation of phishbait at scale and as a topical theme that can appear in lures. We continue to track concerns about the new technology as they surface in the literature.