Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Wrapping up CSAM 2022 with Vulnerability Management Advice for Everyone

As we wrap up Cybersecurity Awareness Month (CSAM) 2022, the final topic we’ll cover is updating software and patching vulnerabilities. According to the 2022 Data Breach Investigations Report (DBIR) from Verizon one of the top paths threat actors use to infiltrate organizations is exploiting vulnerabilities. And there appears to be no end in sight as the number of unique security vulnerabilities rose almost 10% in 2021, up to 20,142 from 18,351 in 2020.

Understanding alert overload part 1: Why security teams are drowning in disconnected data

In cybersecurity, it's easy to feel like your successes don't matter. After all, if things go wrong and a failure happens, that’s a lot more likely to make front-page news. Media coverage of high-profile breaches is growing, even for companies that have invested heavily to build up their security programs. Security breaches are never fun, but they're even less enjoyable when you know that your company could have done something about it.

Sysdig TRT uncovers massive cryptomining operation leveraging GitHub Actions

The Sysdig Threat Research Team (Sysdig TRT) recently uncovered an extensive and sophisticated active cryptomining operation in which a threat actor is using some of the largest cloud and continuous integration and deployment (CI/CD) service providers; including GitHub, Heroku, Buddy.works, and others to build, run, scale, and operate their massive cloud operation. Because no one has yet reported on this activity and its techniques, we are going to refer to this cluster of activity as PURPLEURCHIN.

Why Security is Central to Citizen Experience Part 3: A Helping Hand from the Private Sector

Building trust in government is both my passion and part of my character. Last year, when I found myself contemplating my next career move, I knew that I wanted to be at an innovative company devoted to rebuilding trust in federal agencies. It didn’t take long for me to realize that Veracode and I were a perfect fit. Immediately I saw how the company’s mission and innovative application-security technology aligned with my values.

Criminal Minds: How the Cyber Crime World Works | Razorwire Podcast

EP08. Criminal Minds: How the Cyber Crime World Works Keywords: criminals, cybercrime, cybersecurity, ransomware, Welcome again to the Razorwire podcast. Sun Tzu wrote that if you know your enemy and yourself then you need not fear the outcome of all your battles. In this episode, we discuss the enemy, how they work, how the larger gangs are set up and the dangers of large, organised cybercrime gangs vs the smaller gangs. We also take a look at how they chose a target and why.

Zero trust in the cloud: Best practices and potential pitfalls

Architecturally speaking, cloud-native applications are broken down into smaller components that are highly dynamic, distributed, and ephemeral. Because each of these components is communicating with other components inside or outside the cluster, this architecture introduces new attack vectors that are difficult to protect against using a traditional perimeter-based approach.

Node.js multithreading with worker threads series: worker_threads tutorial

Node.js provides a single-threaded JavaScript run-time surface that prevents code from running multiple operations in parallel. If your application typically employs synchronous execution, you may encounter blocks during long-running operations. However, Node.js itself is a multi-threaded application. This is evident when you use one of the standard library’s asynchronous methods to perform I/O operations, such as reading a file or making a network request.

Create Automated Workflows with Pre-Built Falcon Fusion Playbooks

CrowdStrike Falcon Fusion is an extensible framework built on the Falcon Platform that allows the orchestration and automation of complex workflows. These workflows can be used to simplify tasks, accelerate response time, and save valuable time for security teams. Falcon Fusion is included in the Falcon platform and available to all customers. Available in console now are Falcon Fusion playbooks. Playbooks are pre-built workflow templates centered around common use cases.