Organizations are becoming increasingly more reliant on data to make effective, evidence-based decisions to drive business outcomes. Whether this be assessing market conditions and improving customer experience, ensuring application uptime, or securing an organization, data from multiple sources — including consumers and internal systems — is critical to day-to-day … [Read more...] about Elasticsearch and data architecture: 4 essential tools for improved analysis and storage
analysis
Review and analysis of fake Trezor cryptowallet
Easy to steal and cash out, сryptocurrency is one of the most attractive digital assets for attackers. Accordingly, serious investors often use hardware cryptowallets to protect their crypto-investments. Such a wallet stores private keys away from vulnerable computers and smartphones and makes it much safer to sign transactions. But unfortunately, owning a hardware wallet … [Read more...] about Review and analysis of fake Trezor cryptowallet
Deepfake market analysis | Kaspersky official blog
Cybercrime quickly adopts new technologies. One of the most concerning trends is the rise of deepfakes — forged images, audio or video created with the aid of artificial intelligence, which makes them appear absolutely real — at least to the naked eye. The issue is all the more disturbing of late as tools for AI-generation become increasingly widespread and accessible to the … [Read more...] about Deepfake market analysis | Kaspersky official blog
Increasing Implications: Adding Security Analysis to Kubernetes 360 Platform
A quick look at headlines emanating from this year’s sold out KubeCon + CloudNativeCon Europe underlines the fact that Kubernetes security has risen to the fore among practitioners and vendors alike.As is typically the case with our favorite technologies, we’ve reached that point where people are determined to ensure security measures aren’t “tacked on after the fact” as … [Read more...] about Increasing Implications: Adding Security Analysis to Kubernetes 360 Platform
February Patch Tuesday 2023: Updates and Analysis
Microsoft has released 75 security patches for its February 2023 Patch Tuesday rollout: 9 vulnerabilities are rated Critical, and the remaining 66 are rated Important. Three actively exploited vulnerabilities were reported by the vendor: an elevation of privilege within Windows Common Log File System Driver (CVE-2023-23376), a security feature bypass in Microsoft Office … [Read more...] about February Patch Tuesday 2023: Updates and Analysis
October Patch Tuesday 2022: Updates and Analysis
Microsoft has released 84 security patches for its October 2022 Patch Tuesday rollout. Of these, 13 vulnerabilities are rated Critical, while the remaining 71 are rated Important. It should be noted that this month’s patching update does not include patches for ProxyNotShell, despite the active exploitation of two related vulnerabilities; CrowdStrike offers recommendations on … [Read more...] about October Patch Tuesday 2022: Updates and Analysis
August Patch Tuesday 2022: Updates and Analysis
Microsoft has released 121 security patches for its August 2022 Patch Tuesday rollout. Seventeen vulnerabilities are rated Critical in severity and the rest are classified as Important, with one (CVE-2022-34713) under active exploitation. In this blog, the CrowdStrike Falcon Spotlight™ team analyzes this month’s vulnerabilities, highlights the most severe CVEs and recommends … [Read more...] about August Patch Tuesday 2022: Updates and Analysis
July Patch Tuesday 2022: Updates and Analysis
Microsoft has released 84 security patches for its July 2022 Patch Tuesday rollout. Four vulnerabilities are rated Critical in severity and the rest are classified as Important, with one (CVE-2022-22047) under active exploitation. In this blog, the CrowdStrike Falcon Spotlight™ team offers an analysis of this month’s vulnerabilities, as well as insights into the vulnerabilities … [Read more...] about July Patch Tuesday 2022: Updates and Analysis
Researchers Share In-Depth Analysis of PYSA Ransomware Group
An 18-month-long analysis of the PYSA ransomware operation has revealed that the cybercrime cartel followed a five-stage software development cycle from August 2020, with the malware authors prioritizing features to improve the efficiency of its workflows. This included a user-friendly tool like a full-text search engine to facilitate the extraction of metadata and enable the … [Read more...] about Researchers Share In-Depth Analysis of PYSA Ransomware Group
March 2022 Patch Tuesday: Updates and Analysis
Microsoft has released 71 security patches for its March Patch Tuesday rollout. Of the 71 CVEs addressed, three are ranked as Important zero-days. This month the quantity of patches for Critical vulnerabilities remains low; however, the total number of updates is nearly double what was offered in February 2022. As vulnerabilities and patches continue to be released, and as … [Read more...] about March 2022 Patch Tuesday: Updates and Analysis