Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Using the Principle of Least Privilege to Protect Your Data: Key Benefits and Implementation Tips

Excessive access rights increase the risk of cybersecurity incidents. Implementing the principle of least privilege (POPL) can help you significantly limit the attack surface and protect your organization from the financial and reputational losses that may follow a cybersecurity breach. This article aims to reveal the importance of POLP and equip you with the best practices for its effective implementation.

Welcoming Bob Lyle,Our Chief Revenue Officer

‍We are thrilled to welcome Bob Lyle to Riscosity as our Chief Revenue Officer. Bob is an accomplished executive with extensive GTM experience in scaling software and security companies. He will be responsible for the planning, development, and global execution of our revenue strategy as we continue to evolve our business.

Webinar: Is the biggest risk the one you can't see coming? With EY & Tanium

An exclusive webinar in collaboration with EY to learn how the Managed Visibility and Control joint solution addresses DORA and NIS2 regulatory compliance challenges. Organizations need to be smart about their data, network and endpoint device security while managing the associated risks as access to data becomes more fluid. Where most security breaches once came through networks, now it’s the endpoint devices becoming targets for bad actors.

Adobe ColdFusion Vulnerability: SafeBreach Coverage for US-CERT Alert (AA23-339A)

On December 5th, the Cybersecurity and Infrastructure Security Agency (CISA) released an advisory that confirmed the exploitation of CVE-2023-26360 at a Federal Civilian Executive Branch (FCEB) agency by unknown threat actors. Exploiting this vulnerability allowed threat actors to gain access to the FCEB agency network on two separate occasions in June 2023.

The Pool Party You Will Never Forget: New Process Injection Techniques Using Windows Thread Pools

During a cyber attack, malicious actors often breach an organization’s perimeter security with tactics like vulnerability exploitation and phishing. Once inside, they attempt to navigate the organization’s network to escalate their privileges and steal or encrypt data—but here they often face sophisticated endpoint detection and response (EDR) systems designed to identify and prevent this type of activity.

The SEC, the SolarWinds Complaint, and the Lack of Transparency

‍ The US Securities and Exchange Commission's complaint against SolarWinds and its Chief Information Security Officer (CISO) Tim Brown has sent shockwaves through the cybersecurity community. Solarwinds and Brown have been accused of fraud, the details of which can be found in an extensive 68-page document. ‍ This complaint, in itself a bold move, has been particularly jolting to cyber professionals given the SEC’s July 2023 regulations.

Request smuggling and HTTP/2 downgrading: exploit walkthrough

During a recent penetration test on a customer application, I noticed weird interactions between the web front-end and back-end. This would eventually turn out to be a vulnerability called HTTP request smuggling, enabled by the fact that the front-end was configured to downgrade HTTP/2 requests to HTTP/1.1. With the help from my colleague Thomas Stacey, we were able to construct an exploit chain with response queue desynchronization along with traditional HTTP/1.1 request smuggling techniques.