Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Darkside of GraphQL

GraphQL is a query language for APIs that provides a powerful and efficient way to query and manipulate data. As powerful and versatile as GraphQL is, its downside is that it can be vulnerable to certain security threats. In this presentation, we will discuss the security vulnerabilities associated with GraphQL, from the basics to more advanced threats, and how to best protect against them. After this presentation, attendees will have a better understanding of security vulnerabilities in GraphQL, as well as an understanding of the steps needed to protect against them.

What is a Cybersecurity Assessment?

Routine cybersecurity assessments are a crucial component of a holistic risk management program. Your organization must keep an eye on the cyber hygiene of its entire ecosystem, including third- and fourth-party vendors, at all times. A cybersecurity risk assessment allows you to do this by identifying the cyber risks that affect your security posture, which leads to more informed decision-making on how best to allocate funds, implement security controls, and protect the network.

Hundreds of Thousands of Records Stolen from Washington Cancer Center

Fred Hutchinson Cancer Center (FHCC) is a three-location care network that delivers solutions for cancer patients. They are an independent organization that provides experience for the University of Washington’s Medicine programs. FHCC’s multiple locations allow for over 400 treatment trials, giving even patients with advanced diagnoses hope for the future.

Shells and Flipper Hells: SSH Problems and Pocket Hacking

In the first episode of 2024, Bill and Robin dive into a vulnerability impacting SSH across the world, as well as explore how something in your pocket may get you unwarranted attention. What is the Terrapin attack, and why should you leave your FlipperZero in check-in luggage? Learn all this and more on the latest episode of the Ring of Defense!

Key Elements Defining Efficient Online Facial Recognition Software

In the dynamic sphere of digital security, facial recognition technology stands at the forefront, playing a pivotal role in authentication, identification, and verification processes. Advanced software solutions, including facial recognition programs, face identification software, and facial recognition AI, are revolutionizing online security paradigms. This comprehensive exploration aims to delve deep into the fundamental elements that define efficient online facial recognition software.

The Genesis of "Exodus Logs Market"

A fresh entrant, “Exodus,” has recently emerged on the dark web scene, positioning itself to potentially become one of the key players in the info stealer logs marketplaces. Launched in January 2024, it quickly began to draw attention by mid-February on several dark web forums for its potential to become a significant player, alongside established names like Russian Market and 2easy Shop.

21 Ecommerce Fraud Protection Policies to Implement Now

The thriving online marketplace holds boundless opportunities for businesses and consumers. But lurking beneath the surface of convenient digital transactions is a persistent threat: ecommerce fraud. Consider the unsuspecting customer who stumbles upon what looks like your online store, snags a coveted deal, and enters their payment details—only to find out later that a fraudster has stolen their financial data from a spoofed website.