Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

To use rest_client, or to use rest-client, that is the question

Rest-client is one of the most popular RubyGems, with a simple DSL that allows sending HTTP requests. Lightweight, versatile, developed by famous Rubyists…with all these attributes, this gem is a very shiny and attractive target for malicious actors. All they need is a good method of attack. An attempt made today tried to leverage typosquatting by adding malicious code to rest_client, but it didn’t quite ace the assignment.

CloudFabrix: Giving your AIOps a Makeover with Full-Stack Service Map

AIOps solutions need to process, correlate and establish causation from vast amounts of operational data. In addition, to leverage AI/ML techniques for this purpose, it is essential to have the intelligence of how applications and/or services are connected to various infrastructure components and shared services - which is the Full-Stack Service Map.

Why Crypto Portfolio Tracker Is The Best For All Cryptocurrency Crypto Tax USA?

Do you want to know if a crypto portfolio tracker is the one-stop solution for all cryptocurrency businesses to run it flawlessly? If yes, then you can find everything in detail here. Proceed further and grab the details about Binocs here.

Stories from the SOC: Feeling so foolish - SocGholish drive by compromise

SocGholish, also known as FakeUpdate, is a JavaScript framework leveraged in social engineering drive by compromises that has been a thorn in cybersecurity professionals’ and organizations’ sides for at least 5 years now. Upon visiting a compromised website, users are redirected to a page for a browser update and a zip archive file containing a malicious JavaScript file is downloaded and unfortunately often opened and executed by the fooled end user.

Europe Digital ID Wallet: How Digital Identity is changing the World

Europe’s new Digital Identity wallet offers inhabitants and companies a digital ID they can rely on, it acts as a tool which not only verifies and stores ID data but also enhances the application of the data for ease of use. The European Digital Identity will be held in a mobile phone wallet. This would make it easier to communicate important information in a timely and user-friendly manner at the discretion of the individual.

Outpost24 supports TIBER-EU for threat intelligence-based ethical red-teaming

TIBER-EU is the European framework for threat intelligence-based ethical red-teaming and the first EU-wide guide on how authorities, threat intelligence and red-team providers should collaborate with different organizations to help improve their cyber resilience. Thanks to its threat intelligence offering, Outpost24 is well-positioned to create attack scenarios in line with the TIBER-EU framework.

How Is IT/OT Convergence Transforming Smart Manufacturing?

For most modern businesses, there’s a divide between Information Technology (IT) and Operational Technology (OT). The difference between these equally integral facets of digital manufacturing is a subject currently under debate. Ultimately, information technology deals with information and data. In contrast, operational technology handles the physical processes necessary to use that information.