Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

opsdemon

Latest posts

Complete Checklist to User Access Reviews: Best Practices and Essential Steps

Imagine a former employee still being able to access your network or current employees wielding permissions far beyond their roles. Both scenarios sound risky, right? Excessive permissions aren’t just a minor oversight — they’re significant vulnerabilities that could lead to costly data breaches, regulatory penalties, and other problematic consequences.

Tanium Converge 2024 Recap - Tanium Tech Talks

Tanium Converge 2024 announced some amazing tech! Join two Tanium talkers for an insiders look as we review what happened during this special week. Find out which keynotes to watch on-demand for free. Also check out the other in-person Converge interviews on the Tanium Tech Talks playlist on the channel here. Will we see you there in 2025? Tanium's 2024 Converge user conference was held November 17-21 in Orlando, Florida. Converge 2025 will be in Orlando, Florida, November 17-20.#CatchMeAtConverge.

The Ultralytics Supply Chain Attack: Connecting the Dots with GitGuardian's Public Monitoring Data

On December 4, 2024, the Ultralytics Python module was backdoored to deploy a cryptominer. Using GitGuardian’s data, we reconstructed deleted commits, connecting the dots with the initial analysis. This investigation highlights the value of GitGuardian’s data in understanding supply chain attacks.

Decoding Stablecoins: A Revolution in Blockchain-Based Payments

With the advent of cutting-edge technologies like blockchain, the payments space is rapidly evolving. A conversation between Ran Goldi of Fireblocks and Nikola Plecas of Visa Crypto took listeners on a deep dive into the world of digital assets, blockchain, and the role and potential of stablecoins in global payments.

Why User Activity Monitoring (UAM) is a Must for SMBs

The evolution of the professional work environment and digital transformation continues to challenge the boundaries of traditional workforce management systems and practices. With 28% of workers worldwide working from home at least one day a week, gaining visibility into the digital behavior of the workforce is paramount to effective and secure management.

Ivanti Patches Multiple Critical-Severity Vulnerabilities in Cloud Services Application

On December 10, 2024, Ivanti released updates for three critical-severity vulnerabilities impacting their Cloud Services Application. By chaining the vulnerabilities together, a threat actor could obtain administrative privileges via authentication bypass (CVE-2024-11639), which could then allow for remote code execution (CVE-2024-11172) and/or SQL injection (CVE-2024-11173).

It's Tuesday: Do You Know if You're Compromised?

How do you know that your organization is not breached at this very moment? Many threats are designed to lurk in the shadows, going undetected before causing damage and extracting confidential data from unassuming organizations. And a traditional threat hunt searching for known Indicators of Compromise (IoCs) doesn’t always detect the threats designed to evade.

When Does the Stock Market Close? Global Exchange Times Explained

I've always found the rhythm of the stock market fascinating, especially its opening and closing bells. These times aren't just signals for traders; they mark moments when opportunities arise and decisions are made. Understanding when the stock market closes is crucial, whether you're a seasoned investor or just starting out.