Tag: EN

Fortifying confidential computing in Microsoft Azure

One of the biggest challenges facing any enterprise using the public cloud is the fact that it’s public. Yes, your applications run in isolated virtual machines and your data sits in its own virtual storage appliances, but there’s still a…

GambleForce Group Targets Websites With SQL Injection

Group-IB warns of new threat actor GambleForce, which uses SQL injection attacks to steal data from websites This article has been indexed from www.infosecurity-magazine.com Read the original article: GambleForce Group Targets Websites With SQL Injection

The SANS Holiday Hack Challenge is back!

Skip the sleigh and sail with Santa in this year’s fun, hands-on SANS cybersecurity event Webinar  Whether you are considering a career in cyber security or you already work in the industry, the 2023 SANS Holiday Hack Challenge is a…

Russian Hackers Exploiting JetBrain Vulnerability to Hack Servers

The Federal Bureau of Investigation (FBI), the National Security Agency (NSA), and other co-authoring agencies have issued a warning that Russian Foreign Intelligence Service (SVR) cyber actors are widely exploiting CVE-2023-42793, aiming their attacks at servers that host JetBrains TeamCity…

CISA Asks Public Opinion on Google Workspace Secure Configuration Baselines

In a groundbreaking stride towards fortifying cloud security, the Cybersecurity and Infrastructure Security Agency (CISA) unveils the Secure Cloud Business Applications (SCuBA) Google Workspace (GWS) Secure Configuration Baselines.  This architectural marvel establishes a robust groundwork, elevating data security across nine…

US Sanctions Sinbad Mixer: Disrupting Threats Unveiled

The U.S. Treasury Department recently took a significant step in the ongoing battle against cybercrime by imposing sanctions on Sinbad. It’s a virtual currency mixer utilized by the North Korea-linked Lazarus Group to launder funds obtained through various heists. This…

The Rising Tide of Cybercrime as A Service (CaaS)

By Nik Hewitt, Sr. Content Marketing Manager, TrueFort Welcome to the era of Cybercrime as a Service, or CaaS, which, quite alarmingly, is like an online marketplace for cybercriminals and […] The post The Rising Tide of Cybercrime as A…

Reverse, Reveal, Recover: Windows Defender Quarantine Forensics

Max Groot & Erik Schamper TL;DR Introduction During incident response engagements we often encounter antivirus applications that have rightfully triggered on malicious software that was deployed by threat actors. Most commonly we encounter this for Windows Defender, the antivirus solution…