Daily Archives: June 24, 2020

Automating Security on Your Observability Platform: Cortex XSOAR & Logz.io

0000000000Managing a complex microservice-based architecture requires defending multiple endpoints. Automating security covers a vast amount of tools and methodologies, so making sure they all communicate is critical. Additionally, tool sprawl in any aspect of DevOps requires putting automation to good use. The Logz.io Cloud SIEM focuses on identifying threats. To […]

6 Strategies for a More Resilient Supply Chain

Brexit, the U.S.-China trade war, a general geopolitical trend toward nationalization — and lately the COVID-19 pandemic — have changed the priorities of many supply chain leaders. They now need to balance cost and operational efficiency with greater resilience. In a recent Gartner survey, only 21% of respondents stated that […]

Hackers Using Google Analytics to Bypass Web Security and Steal Credit Cards

Researchers reported on Monday that hackers are now exploiting Google’s Analytics service to stealthily pilfer credit card information from infected e-commerce sites. According to several independent reports from PerimeterX , Kaspersky , and Sansec , threat actors are now injecting data-stealing code on the compromised websites in combination with tracking […]

A zero-day guide for 2020: Recent attacks and advanced preventive techniques

Zero-day vulnerabilities enable threat actors to take advantage of security blindspots. Typically, a zero-day attack involves the identification of zero-day vulnerabilities, creating relevant exploits, identifying vulnerable systems, and planning the attack. The next steps are infiltration and launch.  This article examines three recent zero-day attacks, which targeted Microsoft, Internet Explorer, […]

Special Webcast: Why you need OT-specific threat intelligence – 2020-07-07 17:00:00

In ICS/OT, environments equipment is unique, high-value assets are different, and the cyber risk a company is willing to accept varies between organizations. Additionally, how companies respond to and mitigate vulnerabilities should be completely different from IT, yet the "just patch" mindset still remains widespread. Threat intelligence tailored to industrial […]

The Emergence of Managed Detection & Response (MDR)

Organizations are in a constant state of flux by having to implement changes in their IT environments; that state is even present during the COVID-19 pandemic, as we witness the increase of remote workers. The need to rapidly implement new technologies has become crucial for businesses to operate during hard […]