Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security Bulletin: Magecart Skimming Campaign

Magecart is a long-running digital skimming threat attributed to multiple financially motivated cybercriminal groups specializing in the theft of payment card data from e-commerce websites. First identified in 2015, Magecart attacks have continuously evolved, leveraging compromised third-party services, supply chain vulnerabilities, and increasingly sophisticated obfuscation tactics to inject malicious JavaScript skimmers into checkout pages.

Phishing Kits Are Growing More Sophisticated; Focused on Bypassing MFA

Researchers at Cisco Talos warn that major phishing kits continue to incorporate features that allow them to bypass multi-factor authentication (MFA). Commodity phishing kits like Tycoon 2FA and Evilproxy achieve this by using reverse proxies to intercept traffic from the authentication process during a phishing attack.

How to Reduce Privileged Access Risks by Restricting Local Admin Rights

Discover how to bolster your organization's cybersecurity by reducing privileged access risks! In this video, Netwrix experts share actionable strategies for restricting local admin rights using Netwrix Endpoint Policy Manager to safeguard sensitive data and mitigate insider threats. Learn practical tips to enhance your security posture today!

CrowdStrike Falcon Next-Gen SIEM: AI-Generated parsing

Tired of writing custom parsers just to make your logs usable? With CrowdStrike Falcon Next-Gen SIEM, you can automate log parsing using AI — cutting setup time from days to minutes. In this demo, see how easily you can onboard network logs, generate a parser with AI, and normalize data to the CrowdStrike Parsing Standard — all within a few clicks. CrowdStrike Falcon Next-Gen SIEM: Consolidate security operations with the world’s most complete AI-native SOC platform.

Addressing API Security with NIST SP 800-228

APIs are quickly becoming the primary attack surface targeted by cyber criminals. The rise of generative AI systems, which run on APIs, has driven a dramatic increase in the number of APIs in use. How can you ensure your existing APIs and growing AI deployments remain secure, compliant, and resilient? NIST has now released an initial public draft of SP 800-228: Guidelines for API Protection for Cloud-Native Systems.

How to Adopt DORA's Threat-Led Penetration Testing Requirements

The new Digital Operational Resilience Act (DORA) requires significant financial entities in the EU to carry out Threat-Led Penetration Testing (TLPTs) on a regular basis. However, the skills required along with the planning for these types of exercises can prove difficult and time consuming. During this session, Kroll brings together our red teaming, threat intelligence and DORA regulatory compliance experts to provide practical guidance on how security, risk and resiliency leaders can adopt a sustainable threat-led penetration testing (TLPT) program as required by DORA.