Platform Approach to Cybersecurity: The New Paradigm

Credit to Author: Jon Clay| Date: Thu, 13 Jul 2023 00:00:00 +0000

Embracing platform approach as the path to enhanced security and resilience

Read more

Detecting BPFDoor Backdoor Variants Abusing BPF Filters

Credit to Author: Fernando Merces| Date: Thu, 13 Jul 2023 00:00:00 +0000

An analysis of advanced persistent threat (APT) group Red Menshen’s different variants of backdoor BPFDoor as it evolves since it was first documented in 2021.

Read more

AWS Security Pillar: A Well-Architected Cloud Environment

Credit to Author: Melissa Clow| Date: Wed, 12 Jul 2023 00:00:00 +0000

Explore the Security pillar of the AWS Well-Architected Framework and be guided through the fundamental security controls that should be addressed when designing, transitioning to, and operating in a cloud environment.

Read more

The AWS Well-Architected Framework Guide

Credit to Author: Melissa Clow| Date: Wed, 12 Jul 2023 00:00:00 +0000

Discover the six Amazon Web Services (AWS) Well-Architected Framework pillars by examining best practices and design principles to leverage the cloud in a more efficient, secure, and cost-effective manner.

Read more

Guide to Operationalizing Zero Trust

Credit to Author: Alifiya Sadikali| Date: Tue, 11 Jul 2023 00:00:00 +0000

Zero Trust is no longer a buzzword but an essential element in enterprise security architecture. Operating on the ‘never trust, always verify’ principle, Zero Trust plays a vital role in protecting enterprise assets and data. However, operationalizing Zero Trust can be challenging for businesses.

Read more

Hunting for A New Stealthy Universal Rootkit Loader

Credit to Author: Sherif Magdy| Date: Tue, 11 Jul 2023 00:00:00 +0000

In this entry, we discuss the findings of our investigation into a piece of a signed rootkit, whose main binary functions as a universal loader that enables attackers to directly load a second-stage unsigned kernel module.

Read more

Tailing Big Head Ransomware’s Variants, Tactics, and Impact

Credit to Author: Ieriz Nicolle Gonzalez| Date: Fri, 07 Jul 2023 00:00:00 +0000

We analyze the technical details of a new ransomware family named Big Head. In this entry, we discuss the Big Head ransomware’s similarities and distinct markers that add more technical details to initial reports on the ransomware.

Read more

Cybersecurity Awareness Training to Fight Ransomware

Credit to Author: Jon Clay| Date: Thu, 06 Jul 2023 00:00:00 +0000

Advanced technologies allow organizations to discover, assess and mitigate cyber threats like ransomware. But truly strong cybersecurity also requires a threat-aware workforce—prompting more and more enterprises to focus on cybersecurity awareness training and testing.

Read more

Four Must-haves to Strengthen Your Endpoint Security

Credit to Author: Joyce Huang| Date: Thu, 06 Jul 2023 00:00:00 +0000

To combat complexity and achieve optimal security outcomes, there are four key factors an organization should consider when evaluating their endpoint security.

Read more

ChatGPT Shared Links and Information Protection: Risks and Measures Organizations Must Understand

Credit to Author: Matsukawa Bakuei| Date: Wed, 05 Jul 2023 00:00:00 +0000

Since its initial release in late 2022, the AI-powered text generation tool known as ChatGPT has been experiencing rapid adoption rates from both organizations and individual users. However, its latest feature, known as Shared Links, comes with the potential risk of unintentional disclosure of confidential information.

Read more