Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A Closer Look at the Midnight Blizzard Crew

Microsoft's security team has recently made a significant discovery regarding an increase in cyber-attacks orchestrated by the Russian state-backed group known as the Midnight Blizzard crew. This group, which also operates under the aliases Nobelium, APT29, Cozy Bear, Iron Hemlock, and The Dukes, has been actively targeting personal credentials, according to Microsoft's findings. The Midnight Blizzard hackers employ residential proxy services to conceal the source IP addresses of their attacks.

Balancing Cybercrime Incident Response: Forensics vs. Business Priorities

In today's digital landscape, incident response is a critical aspect of cybersecurity. However, achieving the right balance between conducting extensive forensics and addressing pressing business concerns is vital. Join us in this enlightening video as we explore the complexities of handling security incidents and uncover the reality that often differs from the traditional view of cyber attacks.

Netskope Threat Coverage: Microsoft Office and Windows Zero Day (CVE-2023-36884)

Microsoft disclosed a zero-day vulnerability impacting Office and Windows on July’s Patch Tuesday. This vulnerability has an “important” severity level, and can allow attackers to perform remote code execution with the same privileges as the target. As of this writing, there is no patch available to mitigate the vulnerability, but Microsoft has provided mitigation steps.

Secure Features, Sales Soar | A CPO's Take on Application Security | Marcelino M. (CPO, Stream)

In this episode, Marcelino Moreno (CPO, Stream) shares with Venkatesh (Venky) Sundar how product managers can contribute to an organization's growth by baking in security into the product roadmap. He also shares how a product manager can influence engineering teams to prioritize vulnerability patching along with building features to ensure that the customers use a secure product. Key highlights from the discussion.

Top 6 security considerations for enterprise AI implementation

As the world experiences the AI gold rush, organizations are increasingly turning to enterprise AI solutions to gain a competitive edge and unlock new opportunities. However, amid the excitement and potential benefits, one crucial aspect that must not be overlooked is data security — in particular, protecting against adversarial attacks and securing AI models. As businesses embrace the power of AI, they must be vigilant in safeguarding sensitive data to avoid potential disasters.

Why is Software Vulnerability Patching Crucial for Your Software and Application Security?

Software vulnerability patching plays a critical role in safeguarding your code base, software, applications, computer systems, and networks against potential threats, and ensuring they’re compliant, and optimized for efficiency. Organizations’ codebases have become increasingly complex, involving sophisticated relationships between components and their dependencies.

Quickbase's Rebecca Harness: Securely engaging with technology partners and third-party vendors and overcoming the inevitability of human error

In this episode of The Future of Security Operations podcast, Thomas chats with Rebecca Harness, VP and Chief Information Security Officer at Quickbase. Quickbase is a no-code database and application development platform that enables anyone to safely build, iterate, and integrate their applications. Rebecca has 25 years of experience in information technology and over 12 years of experience in security specifically.

Anatomy of Ransomware Attack: Preventing Attacks on Your Backup Infrastructure

Featuring industry experts, CTOs Danny Allan from Veeam, Sagi Brody from Opti9, and cybersecurity expert Guy Mizrahi, CEO of CyPROS. Gain invaluable insights into the ever-evolving world of ransomware attacks and learn how you can fortify your Veeam installations with the cutting-edge AI-powered anomaly detection tool, Observr.

How I got Phished in my First 30 Minutes

Discover:✅ Why even the savviest individuals struggle to avoid phishing traps, especially amidst multiple software sign-ups and cloud managed services. ✅ From an organisation's standpoint, why acknowledging and reporting phishing attempts, like John's simulated case, is a crucial step towards better security.

What Happens When Someone Makes a Security Mistake?

Discover:✅ Why even the savviest individuals struggle to avoid phishing traps, especially amidst multiple software sign-ups and cloud managed services. ✅ From an organisation's standpoint, why acknowledging and reporting phishing attempts, like John's simulated case, is a crucial step towards better security.