Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CockroachDB Security Hardening

Databases are a critical component of an organization’s infrastructure and a primary target for hackers and cybercriminals. This makes it essential that you have standard practices to secure your database. This article discusses the steps and procedures of securing CockroachDB, a renowned SQL-based and distributed database. CockroachLabs offers both hosted CockroachDB-as-a-Service offering and an enterprise self-hosted version.

June Product Rollup: eTMF, Desktop and Mobile Upgrades, and More

This month, Egnyte is excited to announce the completion of some major milestones of its Egnyte UI redesign project. Other updates in June include security and governance improvements, a new eTMF app for Life Sciences, a new version of the Desktop App, additional FileGuard app functionality, a fully upgraded Egnyte for Outlook integration, and more. Continue reading for details on all these exciting changes.

IDC: Life Sciences Firms Must Embrace Digital Transformation Now

Pre-pandemic, the life sciences industry had settled into a pattern. The average drug took 12 years and $2.9 billion to bring to market, and it was an acceptable mode of operations, according to Nimita Limaye, Research Vice President for Life Sciences R&D Strategy and Technology at IDC. COVID-19 changed that, and served as a proof-of-concept for how technology can truly help life sciences companies succeed and grow, Limaye said.

Tales from the Dark Web: How Tracking eCrime's Underground Economy Improves Defenses

Cybercriminals are constantly evolving their operations, the methods they use to breach an organization’s defenses and their tactics for monetizing their efforts. In the CrowdStrike 2022 Global Threat Report, we examined how the frequency and sophistication of ransomware attacks has grown in the past year.

Adapting security to Amazon EKS Anywhere on Bare Metal

Amazon EKS Anywhere (EKS-A) on Bare Metal is a new deployment option for Amazon Elastic Kubernetes Service that launched this week. Why bare metal? In the age of the cloud it would seem to go against “best practices.” On the contrary. While we tend to overuse the term, “hybrid cloud,” it is a real thing. Enterprises come in all shapes and sizes — and so do their compute choices and privacy requirements.

Attacker Floods npm With Crypto-Mining Packages that Mine Monero When Installed with Default Configuration

Monero (XMR) is an open-source, privacy-oriented cryptocurrency that was launched in 2014. It uses a public distributed ledger containing technology that obscures transaction details to ensure the anonymity of its users. Monero maintains egalitarian mining, allowing anyone to participate. As tempting as it may seem, some go a step further and use the infrastructure of others to participate in mining. Cryptocurrency mining was originally performed using CPUs, and Monero was no different.]

Remote Users - Protect Confidential Information

Greater care should be taken when transferring corporate data onto a remote user's managed endpoint. Certain types of data often require greater levels of authorization to leave the confines of the organization and managed app. When trying to download confidential information, we want to reverify the user's identity with step-up authentication. When the file is downloaded, in addition to file encryption, we also want to add a watermark and redact the confidential information.

CVE-2022-28219: Trivial PoC Exploit Could Lead to Unauthenticated RCE in ManageEngine ADAudit Plus

On Wednesday, June 29, 2022, Horizon3.ai published a proof-of-concept (PoC) exploit that targets CVE-2022-28219, a critical attack chain that includes unauthenticated XML External Entities (XXE), Java deserialization, and path traversal vulnerabilities that could lead to remote code execution (RCE) if successfully chained together. CVE-2022-28219 impacts Zoho’s ManageEngine ADAudit Plus builds prior to 7060. ManageEngine patched CVE-2022-28219 on March 30, 2022.