Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Remote Unauthenticated API Access Vulnerabilities in Ivanti

Ivanti has warned users of its Endpoint Manager Mobile (EPMM) mobile device management (MDM) platform, urging immediate actions to address two vulnerabilities – including a zero-day exploit. These vulnerabilities can potentially be exploited by an unauthorized attacker, leading to unauthorized access to sensitive data and the execution of malicious actions on the affected system.

WormGPT and FraudGPT - The Rise of Malicious LLMs

As technology continues to evolve, there is a growing concern about the potential for large language models (LLMs), like ChatGPT, to be used for criminal purposes. In this blog we will discuss two such LLM engines that were made available recently on underground forums, WormGPT and FraudGPT. If criminals were to possess their own ChatGPT-like tool, the implications for cybersecurity, social engineering, and overall digital safety could be significant.

What Is the Significance of Mobile Device Management in Strengthening Cloud Security?

The rise of the cloud has been a remarkable and transformative switch from physical devices to storing our files online. What surfaced in the late 90s is today so commonplace that every business in this world—big or small—has something on the cloud. The cloud has changed the future of data storage and accessibility forever. One can rightly say that the cloud was the stepping stone to digital transformation. The popularity of mobile devices is not surprising either.

EP 33 - The Evolution of Privileged Access Management (PAM)

Crystal Trawny, Optiv’s Practice Director, Privileged Account and Endpoint Privilege Management (PAM/EPM), joins host David Puner in exploring the ever-evolving identity landscape and how emerging threats impact organizations’ cybersecurity requirements. Through the eyes of an end user, Trawny shares best practices for overcoming change resistance, creating effective deployment timelines and avoiding scope creep.

Introducing BinLib: Your private binary library

Binary Library, or “BinLib”, is a collection of data and metadata pertaining to executable binaries, such as EXE or ELF files, that have been observed within your organization(s). When enabled, this extension collects observed data into your own private collection of historical executables, then subsequently available for searching, tagging, and analysis.

DDoS Empire Shutdown: The Why, What, When & How

Starting from the beginning of 2023, the FBI and other law enforcement agencies worldwide have come together in a united effort to combat cybercrime, with a specific focus on ransomware. This alliance has already resulted in significant arrests, including those of individuals associated with Pompompurin and LockBit, as well as the dismantling of the Hive ransomware group’s infrastructure.

Rubrik and Laminar: Together Securing the World's Data

Today we are excited to share that Rubrik has entered into an agreement to acquire Laminar, the leader in Data Security Posture Management (DSPM), to realize a common vision to secure the world’s data. The combination will create the industry’s first offering to combine cyber recovery and cyber posture and deliver complete cyber resilience across enterprise, cloud, and SaaS.

5 tips to supercharge app security from code to cloud

As the partnership between Snyk and GitGuardian continues to grow, we’ve collaborated on a new cheat sheet that identifies key security considerations and tools that can help you mitigate risks and protect your code. The journey from code to cloud and back to code necessitates a holistic approach to security.

Gate.io Integrates with the Fireblocks Network to Connect with Institutional Investors and Traders

Gate.io, a leading cryptocurrency exchange and Web3 platform, has been successfully integrated into the Fireblocks Network. The exchange was able to connect seamlessly to the Network by using the Fireblocks Network Link, a powerful API standard that enables any crypto exchange to quickly and natively integrate into the Fireblocks ecosystem.

Unlock Success in Tech and Cybersecurity

If you're a developer with a security-focused mindset and coding finesse, or aspire to be a security champion, you're in for a victorious journey. Elevate your prospects by mastering secure coding skills – a golden ticket to becoming an advocate, securing employment, and amplifying your success. However, the journey doesn't end there. Effective communication is the linchpin. Being a tech superstar is great, but combining it with amiable communication fosters real success.