Category: EN

Capable Compliance through Rigorous Secrets Rotation

Is Your Organization Taking a Rigorous Approach to Secrets Rotation? In today’s advanced technological landscape, ensuring compliance and maintaining a capable security posture is no longer optional. Particularly, the management of Non-Human Identities (NHIs) and secrets rotation has become a…

Protected Access: Enhancing Cloud IAM Strategies

Unpacking the Importance of Non-Human Identities (NHIs) in Cloud Security Can we imagine a world where Non-Human Identities (NHIs) weren’t instrumental to our cybersecurity strategies? NHIs, or machine identities, perform an irreplaceable function in today’s environment, where businesses are increasingly…

Building Trust with Efficient Privileged Access Management

Why is Privileged Access Management Crucial? Does it ever cross your mind how privileged access management plays a significant role in safeguarding your organization’s data and systems? With a largely digitalized economy, the landscape of potential security threats has dramatically…

Harnessing Innovation in Machine Identity Management

How Does Innovation Impact Machine Identity Management? Imagine an environment where machine identities are as secure as human identities, where every “tourist” in the system is accounted for, their “passports” encrypted and secure. This is the goal of Non-Human Identity…

Modiloader From Obfuscated Batch File, (Mon, Dec 23rd)

My last investigation is a file called “Albertsons_payment.GZ”, received via email. The file looks like an archive but is identified as a picture by TrID: This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original…

Top 5 Ransomware Attacks and Data Breaches of 2024

As we approach the end of 2024, it’s clear that the landscape of cyber threats has continued to evolve at an alarming pace. With an increasing reliance on digital infrastructures, both private and public sectors have become prime targets for…

Evilginx: Open-source man-in-the-middle attack framework

Evilginx is an open-source man-in-the-middle attack framework designed to phish login credentials and session cookies, enabling attackers to bypass 2FA safeguards. “Back in 2017, I was experimenting with extracting cookies from one browser and importing them into another. I realized…

How companies can fight ransomware impersonations

As these threat actors become increasingly strategic and harder to detect, organizations must take all measures to protect their data, including cybersecurity training. In this Help Net Security video, Rodman Ramezanian, Global Cloud Threat Lead at Skyhigh Security, discusses how…

PentestGPT – A ChatGPT Powered Automated Penetration Testing Tool

GBHackers come across a new ChatGPT-powered Penetration testing Tool called “PentestGPT” that helps penetration testers to automate their pentesting operations. PentestGPT has been released on GitHub under the operator “GreyDGL,” a Ph.D. student at Nanyang Technological University, Singapore. It is…

What open source means for cybersecurity

With outdated and inadequately maintained components, along with insecure dependencies, the open-source ecosystem presents numerous risks that could expose organizations to threats. In this article, you will find excerpts from 2024 open-source security reports that can help your organization strengthen…

Understanding Cyber Threats During the Holiday Season

Understanding Cyber Threats During the Holiday Season Understanding Cyber Threats During the Holiday Season The holiday season, while festive, presents heightened cybersecurity risks for businesses. Cybercriminals exploit increased online activity and reduced vigilance during this period. Understanding these threats is…

How to craft a comprehensive data cleanliness policy

Practicing good data hygiene is critical for today’s businesses. With everything from operational efficiency to cybersecurity readiness relying on the integrity of stored data, having confidence in your organization’s data cleanliness policy is essential. But what does this involve, and…

DEF CON 32 – NTLM: The Last Ride

Authors/Presenters: Jim Rush, Tomais Williamson Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel.…

Apple might be working on a smart doorbell

There’s been a lot of reporting in recent months around Apple’s efforts to expand its footprint in customers’ homes with in-development products like a wall-mounted smart home hub. According to a new report in Bloomberg, that strategy could also include…