Security Patch Management Strengthens Ransomware Defense

Credit to Author: Jon Clay| Date: Thu, 20 Jul 2023 00:00:00 +0000

With thousands of applications to manage, enterprises need an effective way to prioritize software security patches. That calls for a contextualized, risk-based approach and good overall attack surface risk management.

Read more

Possible Supply-Chain Attack Targeting Pakistani Government Delivers Shadowpad

Credit to Author: Daniel Lunghi| Date: Fri, 14 Jul 2023 00:00:00 +0000

We recently found that a modified installer of the E-Office app used by the Pakistani government delivered a Shadowpad sample, suggesting a possible supply-chain attack.

Read more

Supply-Chain Attack Targeting Pakistani Government Delivers Shadowpad

Credit to Author: Daniel Lunghi| Date: Fri, 14 Jul 2023 00:00:00 +0000

We recently found that an MSI installer built by the National Information Technology Board (NITB), a Pakistani government entity, delivered a Shadowpad sample, suggesting a possible supply-chain attack.

Read more

Platform Approach to Cybersecurity: The New Paradigm

Credit to Author: Jon Clay| Date: Thu, 13 Jul 2023 00:00:00 +0000

Embracing platform approach as the path to enhanced security and resilience

Read more

Detecting BPFDoor Backdoor Variants Abusing BPF Filters

Credit to Author: Fernando Merces| Date: Thu, 13 Jul 2023 00:00:00 +0000

An analysis of advanced persistent threat (APT) group Red Menshen’s different variants of backdoor BPFDoor as it evolves since it was first documented in 2021.

Read more

AWS Security Pillar: A Well-Architected Cloud Environment

Credit to Author: Melissa Clow| Date: Wed, 12 Jul 2023 00:00:00 +0000

Explore the Security pillar of the AWS Well-Architected Framework and be guided through the fundamental security controls that should be addressed when designing, transitioning to, and operating in a cloud environment.

Read more

The AWS Well-Architected Framework Guide

Credit to Author: Melissa Clow| Date: Wed, 12 Jul 2023 00:00:00 +0000

Discover the six Amazon Web Services (AWS) Well-Architected Framework pillars by examining best practices and design principles to leverage the cloud in a more efficient, secure, and cost-effective manner.

Read more

Guide to Operationalizing Zero Trust

Credit to Author: Alifiya Sadikali| Date: Tue, 11 Jul 2023 00:00:00 +0000

Zero Trust is no longer a buzzword but an essential element in enterprise security architecture. Operating on the ‘never trust, always verify’ principle, Zero Trust plays a vital role in protecting enterprise assets and data. However, operationalizing Zero Trust can be challenging for businesses.

Read more