As cloud environment evolve, efficient and effective workload security has been at the top of the list. At Cisco, we have integrated the Isovalent platform into our infrastructure to ensure our cloud workloads are protected without compromising on performance. Why Isovalent? The Isovalent platform is based on the eBPF (extended Berkeley Packet Filter) technology that … [Read more...] about How Cisco Uses Isovalent to Secure Cloud Workloads
Cloud Data Logs: Heroes of Detection and Response
These logs provide deep visibility into the resource and service layers of cloud environments, enabling security teams to monitor for suspicious behavior, identify vulnerabilities and detect unauthorized actions. In the event of a breach, cloud logs are essential for incident response. They serve as the digital evidence needed to understand how an attack unfolded, which … [Read more...] about Cloud Data Logs: Heroes of Detection and Response
Secure Workload 3.10 Has It
In recent years, cyberattacks have become more sophisticated and pervasive, easily outpacing traditional security measures like perimeter firewalls. This shift has highlighted the critical need for advanced security strategies. Microsegmentation has emerged as a game-changing approach, enabling robust protection across customers’ increasingly complex networks, which now span … [Read more...] about Secure Workload 3.10 Has It
BLG Reduces False Positives with CrowdStrike
Borden Ladner Gervais LLP is Canada’s largest law firm with 850 lawyers and 2,300 employees working in five offices spread across the country. The firm is 200 years old and fully bilingual across its wide array of practices, which include intellectual property, mergers and acquisitions, health law, commercial law, cybersecurity and privacy. BLG’s lawyers are proud of their … [Read more...] about BLG Reduces False Positives with CrowdStrike
Credentials and API Keys Leaking Online
Dec 12, 2024Ravie LakshmananVulnerability / Cloud Security Cybersecurity researchers are warning that thousands of servers hosting the Prometheus monitoring and alerting toolkit are at risk of information leakage and exposure to denial-of-service (DoS) as well as remote code execution (RCE) attacks. "Prometheus servers or exporters, often lacking proper authentication, … [Read more...] about Credentials and API Keys Leaking Online
Which encrypted file storage to choose?
No one can deny the convenience of cloud file-storage services like Dropbox or OneDrive. The one drawback is that cybercriminals, intelligence agencies, or the hosting provider itself can view your cloud-based files without authorization. But there’s a more secure alternative: encrypted cloud file-storage. Some call it end-to-end encryption (E2EE) — similar to Signal and … [Read more...] about Which encrypted file storage to choose?
5 Common Data Protection Challenges and Solutions
Organizations understand their sensitive data is everywhere — and adversaries are after it. Data protection solutions have become an essential part of modern cybersecurity strategies. Organizations realize that in order to avoid a breach, they must have a plan to monitor and control data flow at the user level so they can better understand where data is going, who is … [Read more...] about 5 Common Data Protection Challenges and Solutions
Secret Blizzard Deploys Kazuar Backdoor in Ukraine Using Amadey Malware-as-a-Service
Dec 11, 2024Ravie LakshmananMalware / Cyber Espionage The Russian nation-state actor tracked as Secret Blizzard has been observed leveraging malware associated with other threat actors to deploy a known backdoor called Kazuar on target devices located in Ukraine. The new findings come from the Microsoft threat intelligence team, which said it observed the adversary leveraging … [Read more...] about Secret Blizzard Deploys Kazuar Backdoor in Ukraine Using Amadey Malware-as-a-Service
December 2024 Patch Tuesday: Updates and Analysis
Zero-Day Vulnerability (CVE-2024-49138) Exploit Observed in the Wild CVE-2024-49138 is a privilege escalation vulnerability within the Microsoft Windows Common Log File System (CLFS) driver, categorized as Important in severity. CrowdStrike Counter Adversary Operations discovered and privately reported this vulnerability to Microsoft, which subsequently acknowledged, … [Read more...] about December 2024 Patch Tuesday: Updates and Analysis
Cleo File Transfer Vulnerability Under Exploitation – Patch Pending, Mitigation Urged
Dec 10, 2024Ravie LakshmananVulnerability / Threat Analysis Users of Cleo-managed file transfer software are being urged to ensure that their instances are not exposed to the internet following reports of mass exploitation of a vulnerability affecting fully patched systems. Cybersecurity company Huntress said it discovered evidence of threat actors exploiting the issue en … [Read more...] about Cleo File Transfer Vulnerability Under Exploitation – Patch Pending, Mitigation Urged