New to reversing? The differences between IDA Pro, ImmDBG and OllyDBGIntroduction In this blog post we will look at some of the differences between a several...
Month: November 2022
Secure Software Development Compliance for OMB’s M-22-18 Memo | Code Patrol Podcast | Contrast Security
Secure Software Development Compliance for OMB’s M-22-18 Memo | Code Patrol Podcast | Contrast Security Do you swear to tell the truth about your secure software...
A False Assumption of Trust in Business APIs
A False Assumption of Trust in Business APIs Digital business is driving significant levels of growth and effectiveness for companies in a way that is becoming...
More API Inventory Auditing Necessary to Limit Incidents
More API Inventory Auditing Necessary to Limit Incidents The API industry is booming. Development of application programming interfaces has outpaced many areas of IT as APIs...
SuperTravel Protects its Proprietary Data From Scraping With DataDome
SuperTravel Protects its Proprietary Data From Scraping With DataDomeAfter testing multiple bot protection technologies, SuperTravel selected DataDome to protect it's valuable content from malicious actors. The...
How to protect against CVE-2022-42889 | Text4Shell vulnerability protection | Contrast Security
How to protect against CVE-2022-42889 | Text4Shell vulnerability protection | Contrast Security A new Common Vulnerability and Exposure (CVE) — CVE-2022-42889, aka Text4Shell — was recently...
Hard Truths About Driving a Security Mindset
Hard Truths About Driving a Security Mindset Working in cybersecurity as a consultant can be eye-opening. We regularly see clients who, despite knowing they need cybersecurity,...
Secure Software Development Compliance for OMB’s M-22-18 Memo | Code Patrol Podcast | Contrast Security
Secure Software Development Compliance for OMB’s M-22-18 Memo | Code Patrol Podcast | Contrast Security Do you swear to tell the truth about your secure software...
A False Assumption of Trust in Business APIs
A False Assumption of Trust in Business APIs Digital business is driving significant levels of growth and effectiveness for companies in a way that is becoming...
SuperTravel Protects its Proprietary Data From Scraping With DataDome
SuperTravel Protects its Proprietary Data From Scraping With DataDomeAfter testing multiple bot protection technologies, SuperTravel selected DataDome to protect it's valuable content from malicious actors. The...
How to protect against CVE-2022-42889 | Text4Shell vulnerability protection | Contrast Security
How to protect against CVE-2022-42889 | Text4Shell vulnerability protection | Contrast Security A new Common Vulnerability and Exposure (CVE) — CVE-2022-42889, aka Text4Shell — was recently...
Hard Truths About Driving a Security Mindset
Hard Truths About Driving a Security Mindset Working in cybersecurity as a consultant can be eye-opening. We regularly see clients who, despite knowing they need cybersecurity,...
BSidesLV 2022 Lucky13 I Am The Cavalry (IATC) – Josh Corman’s ‘Day One Feedback Loop: What Did We Hear?’
BSidesLV 2022 Lucky13 I Am The Cavalry (IATC) – Josh Corman’s ‘Day One Feedback Loop: What Did We Hear?’Our sincere thanks to BSidesLV for publishing their...
Chinese Tech: Banned in DC, but not in the States
Chinese Tech: Banned in DC, but not in the States There’s a massive loophole in the federal ban on Chinese technology from sus firms such as Huawei...
What You Should Know about the New OpenSSL Vulnerability
What You Should Know about the New OpenSSL VulnerabilityFind out how to detect which OpenSSL version you’re running and if your organization is exposed to the...
Accused ‘Raccoon’ Malware Developer Fled Ukraine After Russian Invasion
Accused ‘Raccoon’ Malware Developer Fled Ukraine After Russian InvasionA 26-year-old Ukrainian man is awaiting extradition to the United States on charges that he acted as a...
2023 IT Security Predictions From Professionals Who Live It Every Day
2023 IT Security Predictions From Professionals Who Live It Every DayTo beat the prediction rush, Radware reached out to several of our customers to find out...
The Mirage of Mandiant: Post-Acquisition Follow-Up
The Mirage of Mandiant: Post-Acquisition Follow-UpRevisiting the strategic implications of Google Cloud and Mandiant following the Google Cloud Next conference. The post The Mirage of Mandiant:...
Unofficial Patch Released for New Actively Exploited Windows MotW Vulnerability
Unofficial Patch Released for New Actively Exploited Windows MotW VulnerabilityAn unofficial patch has been made available for an actively exploited security flaw in Microsoft Windows that...
Fodcha DDoS Botnet Resurfaces with New Capabilities
Fodcha DDoS Botnet Resurfaces with New CapabilitiesThe threat actor behind the Fodcha distributed denial-of-service (DDoS) botnet has resurfaced with new capabilities, researchers reveal. This includes changes...
Tips for Choosing a Pentesting Company
Tips for Choosing a Pentesting CompanyIn today's world of automated hacking systems, frequent data breaches and consumer protection regulations such as GDPR and PCI DSS, penetration...
Undisclosed OpenSSL vulnerability: Free scripts for target scoping
Undisclosed OpenSSL vulnerability: Free scripts for target scoping Tomorrow is “patch Tuesday” and it's a notable one. The OpenSSL project team announced last week that they...
How Does a Browser Trust a Certificate?
How Does a Browser Trust a Certificate?How Does a Browser Trust a Certificate? Scott Carter Mon, 10/31/2022 - 17:00 6490 views Browsers prevent this type of...
Psychotherapy extortion suspect: arrest warrant issued
Psychotherapy extortion suspect: arrest warrant issuedWanted! Not only the extortionist who abused the data, but also the CEO who let it happen.Leer másNaked SecurityWanted! Not only...
Safeguards Rule: 9 Steps to Compliance for Auto Dealerships
Safeguards Rule: 9 Steps to Compliance for Auto DealershipsAutomobile dealerships collect and store large amounts of consumer data, including Social Security numbers, bank account information, and...
CISA releases cybersecurity performance goals to reduce risk and impact of adversarial threats
CISA releases cybersecurity performance goals to reduce risk and impact of adversarial threatsLast week, the US Cybersecurity and Infrastructure Security Agency (CISA) released voluntary cross-sector Cybersecurity...
Nearly a Third of Cybersecurity Leaders Considering Quitting
Nearly a Third of Cybersecurity Leaders Considering QuittingResearch commissioned by BlackFog shows that work life balance is most disliked part of the job for cybersecurity leaders....
Engineering workstation attacks on industrial control systems double: Report
Engineering workstation attacks on industrial control systems double: ReportEngineering workstation compromises were the initial attack vector in 35% of all operational technology (OT) and industrial control...
On Demand Subscription: Drive Immediate Value From SOC Prime Platform
On Demand Subscription: Drive Immediate Value From SOC Prime Platform A community-driven approach based on Detection-as-Code principles and cutting-edge technology leveraging Sigma language and MITRE ATT&CK®...
CVE-2022-40684 Detection: A Critical Fortinet Authentication Bypass Vulnerability Exploited in the Wild
CVE-2022-40684 Detection: A Critical Fortinet Authentication Bypass Vulnerability Exploited in the Wild Heads up! A new critical vulnerability is on the radar. Fortinet has recently disclosed...

























