Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Over Half of Malware Downloads Originate from SaaS Apps

As the popularity of SaaS apps continues to grow, security analysts expect the misuse of such apps as the host for malware downloads to continue to rise through 2024. I’ve provided plenty of examples on this blog of threat actors using cloud-based SaaS applications to host impersonated websites and malicious downloads. The credibility of such sites aids the cybercriminal, as traffic to and from reputable sites have a tendency to get past security solutions.

Iran-Aligned Threat Actor "CharmingCypress" Launches Spear Phishing Attacks

Researchers at Volexity warn that the suspected Iranian threat actor CharmingCypress (also known as “Charming Kitten” or “APT42”) has been launching spear phishing attacks against Middle Eastern policy experts. “Throughout 2023, Volexity observed a wide range of spear-phishing activity conducted by CharmingCypress,” the researchers write.

Beyond the noise: runtime-based vulnerability management for effective threat control

In an ideal world, patching every vulnerability before attackers discover them would be a breeze. The reality of the evolving cloud-native landscape, with its ever-changing mix of cloud, DevOps, mobile, and critical infrastructure, paints a different picture. New risks emerge constantly, leaving traditional vulnerability management approaches struggling to keep up. Meanwhile, Security and DevOps teams face ongoing pressure to protect their organizations from vulnerabilities.

Installing and Connecting to the Rubrik Security Cloud PowerShell SDK

The Rubrik Security Cloud PowerShell module enables organizations to automate and orchestrate various tasks within the RSC platform using a simple, easy-to-understand scripting language. During this video, you will learn how to install and configure the Rubrik Security Cloud PowerShell module, along with the various ways to connect to your RSC platform. Helpful Links.

What is Multimodal AI? How Can it Benefit Your Organization?

In the evolving domain of artificial intelligence (AI), Multimodal AI emerges as a transformative force, reshaping how machines perceive and interact with the world. Multimodal AI encapsulates a sophisticated integration of various modalities, including text, image, speech, and other sensory inputs, fostering a more comprehensive understanding of data. Multimodal AI transcends the limitations of unimodal approaches, enabling a more nuanced and context-aware AI system.

Secrets Management vs Secrets Detection: Here's What You Need to Know

As the name might imply, it’s important to keep secrets secret. Access to even the smallest of secrets can open a window for attackers who can then escalate their access to other parts of the system, allowing them to find more important secrets along the way. Poor practices can leave many secrets lying around unprotected and just one seemingly unimportant secret can lead to a broad security breach.

Top Two Cloud Security Concepts You Won't Want to Overlook

Organizations transitioning to the cloud require robust security concepts to protect their most critical assets, including business applications and sensitive data. Rony Moshkovitch, Prevasio’s co-founder, explains these concepts and why reinforcing a DevSecOps culture would help organizations strike the right balance between security and agility. In the post-COVID era, enterprise cloud adoption has grown rapidly.

Modernizing Access to Mitigate Security Risk and Speed Threat Response

Organizations face increasing risk of data breach, with threat actors taking aim at credentials and standing privileges. So what can companies do to protect their infrastructure? Join Melinda Marks, Practice Director of Enterprise Strategy Group (ESG), Ev Kontsevoy (CEO), and Sasha Klizhentas (CTO) of Teleport to explore.

National Cyber Security Centre (NCSC) Vulnerability Management Guidance Checklist

As of February 12, 2024, the National Cyber Security Centre (NCSC) has released Version 2.0 of its vulnerability management guidance. This update provides organizations with the latest strategies and practices to identify, assess, and manage cybersecurity vulnerabilities effectively. The NCSC’s updated guidance on vulnerability management outlines the importance of proactively managing vulnerabilities to secure technical estates.