-
Log4j Is Still Causing Havoc: What We Learned From Log4Shell
If you knew you were at risk for diabetes or cancer, you’d take all the necessary precautions to avoid or delay onset. You’d go for routine checkups and tests to ensure that if signs of the disease appear, you could catch it early, treat it, and hopefully avoid a deadly outcome. A company’s cybersecurity health…
-
Taking Visibility to a New Level CYREBRO SOC Platform 2.0
Our mission at CYREBRO is to bring state-level cybersecurity to businesses of all sizes and types. We believe that all businesses should always see and understand their cybersecurity with clarity, and have the means and capabilities to mitigate cyber threats against their business. That’s why we are launching a new version of our SOC Platform.…
-
How to Prevent Insider Threats
In the 1999 workplace comedy classic Office Space, three disgruntled employees devise a plan: they will plant a virus in the company’s financial system, which siphons fractions of a cent from each transaction and deposits it in one of their bank accounts. Since the transactions are so small, the men are convinced that no one…
-
Timing – A Hackers Greatest Weapon
If you ever have the opportunity to talk to someone in charge of security at a maximum penitentiary, they will tell you the same thing. The prisoners have all the time in the world. All the time to watch and observe, looking for vulnerabilities within the patterned behaviors of the guards and penitentiary staff. They…
-
How SSO can lead to a Pass-The-Hash Attacks
Apple AirTags. Google Maps. Single sign-on technology. What do these three seemingly random tech advancements have in common? Each was created to make our daily experiences more convenient, yet each has been exploited for evil purposes. Stalkers are using AirTags to track the whereabouts of unsuspecting victims; criminals are plotting attacks and burglaries using detailed…
-
Reverse Proxies Are Killing Your MFA
If you’re old enough to remember landlines (or have seen any 1980s or 90s movie about teens looking to put one over on their parents), chances are your parents pulled a real-world man-in-the-middle attack (MITM) on you. There you were as a sneaky teenager plotting with a friend over the phone about going to a…