Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

European Security is More Than Regulation: Splunk's 2023 CISO Report

The role of today’s Chief Information Security Officers (CISOs) is complex and rapidly changing. 86% say that the role has changed so much since they became a CISO that it’s almost a different job. They are emerging as strategists and leaders who have a louder voice in the boardroom.

Unveiling Socks5Systemz: The Rise of a New Proxy Service via PrivateLoader and Amadey

Proxy services offer users the ability to rent a set of IP addresses for internet use, granting a level of online anonymity. Essentially, they make your internet traffic appear as if it's coming from a regular IP address while keeping the real origin hidden. Recently, our Threat Research team discovered a new malware sample, distributed by the PrivateLoader and Amadey loaders.

A guide to digital forensics data acquisition with FTK Imager

In the field of Digital Forensics and Incident Response (DFIR), acquiring a forensic copy of a suspect's storage device is a critical first step. This process involves either disk imaging or disk cloning, each with its own distinct purposes and methodologies. In this blog, we'll delve into the differences between disk imaging and disk cloning, when to use each method, and provide step-by-step guidance on how to create a forensic disk image using FTK Imager.

Insider Threats in Cybersecurity

When you think about security, it's usually from external factors. We lock the doors to our homes and businesses, when we go to the gym our belongings are kept safe in locked lockers from theft, and our computers and phones have security measures in place to keep people out. Our focus is on external threats but the biggest danger can come from within — insider threats. Consider the classic thriller When a Stranger Calls.

Introducing Cloud DLP for Microsoft Teams

San Francisco, CA, November 2, 2023—Nightfall AI, the leader in cloud data leak prevention (cloud DLP), announced the launch of the industry’s only AI-native DLP solution for popular communication app Microsoft Teams. Microsoft Teams continues to grow as a top enterprise collaboration tool, with over 300 million monthly active users reported in Q3 of 2023. As the dominant communication app in highly regulated industries (e.g.

Massive Surge in Security Breaches of Pensions Prompt Questions

A recent report from RPC has revealed that cybersecurity breaches in UK pension schemes increased by 4,000% from 2021/22 to 2022/23. Understandably, the announcement has raised serious concerns about the efficacy of financial service organization’s cybersecurity programmes.

Container Security Essentials: Vulnerability Scanning and Change Detection Explained

Containers offer a streamlined application deployment and management approach. Thanks to their efficiency and portability, platforms like Docker and Kubernetes have become household names in the tech industry. However, a misconception lurks in the shadows as containers gain popularity - the belief that active vulnerability scanning becomes redundant once containers are implemented.

How Vanta migrated MDM platforms in just 3 days

In this series, you’ll hear directly from Vanta’s own Security, Enterprise Engineering, and Privacy, Risk, & Compliance Teams to learn about our approach to keeping Vanta secure. We’ll also share some guidance for teams of all sizes — whether you’re just getting started or looking to uplevel your operations.