Modern DDoS Attacks and the Rise of DDoS Coalitions

Modern DDoS Attacks and the Rise of DDoS Coalitions

| | Blog, DDoS attack
DDoS attacks have become an indispensable weapon to paralyze network systems in cyber warfare. Emerging DDoS attacks, such as HTTP/2 Rapid Reset and SLP reflection amplification attacks, are constantly emerging. Both attackers ...

Unearthing Identity Threat Exposures

Organizations must navigate through a tumultuous sea of cybersecurity threats today. As businesses increasingly transition to the cloud and embrace remote work, the complexity of managing digital identities has exponentially grown, unveiling ...

Webinar Recap: Cybersecurity Trends to Watch in 2024

Predicting the future of cybersecurity is an impossible task, but getting some expert advice doesn’t ...
Why SIEM Providers should consider a Next-Gen SIEM for improved TDIR

10 Questions to Ask SIEM Providers

| | Blog, SIEM
Discover the essential questions to ask SIEM providers. Ensure you choose the right SIEM provider and solution with our comprehensive guide for effective cybersecurity. The post 10 Questions to Ask SIEM Providers ...
The 11 Best GRC Tools for 2024

The 11 Best GRC Tools for 2024

| | Blog, Topic
With so many GRC tools available, figuring out which suits your organization can be challenging.  Governance, Risk, and Compliance (GRC) platforms help organizations optimize their governance strategies, streamline risk management processes, and ...

Ethics of Cyber Security: To Disclose or Not? 

In a recent panel discussion, a thought-provoking question was posed to us, one that delves into the murky waters of cyber security and governmental responsibility. The query centered on the obligation of ...
XZ Utils Backdoor Vulnerability (CVE-2024-3094) Advisory

XZ Utils Backdoor Vulnerability (CVE-2024-3094) Advisory

Overview NSFOCUS CERT recently detected that a backdoor vulnerability in XZ Utils (CVE-2024-3094) was disclosed from the security community, with a CVSS score of 10. Because the SSH underlying layer relies on ...
Linux Kernel Privilege Escalation Vulnerability (CVE-2024-1086) Alert

Linux Kernel Privilege Escalation Vulnerability (CVE-2024-1086) Alert

NSFOCUS CERT has detected that details and a proof-of-concept (PoC) tool for a Linux kernel privilege escalation vulnerability CVE-2024-1086, have been publicly disclosed recently. Due to a use-after-free vulnerability in the netfilter: ...

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a ...

Android Supply Chain Validation Cheat Sheet

| | Blog
Several different tools and techniques are available for Android to enumerate software and configurations, allowing you to begin to validate the software on devices. This cheat sheet is based on the work ...

Secure Guardrails