Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

The 443 Security Simplified Podcast - Episode 196: Building Security Strategies with Matt Lee

In this special video edition of The 443 Security Simplified, we sit down for a chat with Matt Lee, Sr. Director of Security and Compliance at Pax8 and well-known cyber security educator, to discuss security strategies for MSPs and midsize enterprises in the face of a dynamic threat landscape. We cover everything from picking a framework to getting buy in from stakeholders and take a forward look at what future cyber regulations may look like to all organizations.

Securing the Hybrid Workforce with Netskope Zero Trust Data Protection and Endpoint DLP

Data no longer resides behind the four walls of the traditional enterprise perimeter—it’s everywhere, and can be accessed from seemingly anywhere, thanks to the rapid embrace of cloud by enterprises and the acceleration of hybrid work, or work-from-anywhere, behind the global pandemic.

Why the Cybersecurity Industry Needs to Change Its Siloed Perception

As high-profile data theft incidents continue to rise and become more sophisticated, there is a greater-than-ever need for emerging businesses to take their cybersecurity seriously. So, why do many entrepreneurs and “startup unicorns” consider it the turf of large-scale organizations only, even after some of the world’s largest corporations have fallen prey to cybercrime? Security breaches at so many companies exposed the personal data of millions of Americans.

Your Password Was Exposed in a Non-Google Data Breach: How to Respond

If you’re a Google Chrome user, you may have received the pop-up alert “Your password was exposed in a non-Google data breach” in your web browser. The alert informs users of any recent security breaches which may have compromised their account passwords. Read on to learn more about what this alert means for your data security and the appropriate steps to secure your personal data.

Credit Card Fraud Investigation: State of Underground Card Shops in 2022

In our latest credit card fraud investigation blog our threat intelligence analysts investigate the current card shop ecosystem, from active shops and the return of Rescator as well as other recently shuttered card shops and credit card fraud to look out for. Methodology Credit Card Fraud Investigation: Active Card Shops Credit Card Fraud Investigation: Inactive Card Shops Conclusions

Finding CVE-2022-22954 with Zeek

CISA released a warning to federal agencies on May 18 that APT actors are actively exploiting recent vulnerabilities found in VMware, including CVE-2022-22954. Your first thought may have been to want new signatures, indicators, and/or behavioral techniques to detect attempted and successful exploits. If you’re a Zeek user or Corelight customer, you’ll find that sometimes you’re already getting what you need.

Outsourcing your SOC

With businesses constantly at risk of cyber threats, leveraging a Security Operations Centre (SOC) is one way for organisations to proactively monitor and manage their threat landscape. Whether it’s in-house or outsourced, a SOC can help companies implement a process-driven security framework that secures business information against the constant threat of a cyber attack.

Mirai Malware Variants for Linux Double Down on Stronger Chips in Q1 2022

Popular for compromising internet-connected devices and conducting distributed denial of service (DDoS) attacks, Mirai malware variants have been known to compromise devices that run on Linux builds ranging from mobile and Internet of Things (IoT) devices to cloud infrastructures.