Cybersecurity Insights with Contrast CISO David Lindner | 2/23/24

Cybersecurity Insights with Contrast CISO David Lindner | 2/23/24

Insight #1 The post quantum encryption era is upon us, and Apple is leading the charge to protect against future quantum computing attacks by boosting security on its iMessage platform, adding a ...
Blog-AmyLuby

3 Things to Ensure your start-up’s success

Execution is a fundamental component of success for any organization. Companies that struggle to execute effectively often face challenges and miss out on opportunities, and I would argue that execution.. The post ...
MITRE ATT&CK Technique-Driven Automation with Smart SOAR

MITRE ATT&CK Technique-Driven Automation with Smart SOAR

MITRE ATT&CK is invaluable for SOC teams in understanding adversary behaviors and actions across a range of networks. This robust framework offers granular insight into various attack tactics, techniques, procedures, and threat ...
Isolate: Network traffic filtering workflow using CrowdStrike, VirusTotal, and FortiGate NGFW.

Implementing MITRE D3FEND for ATT&CK Technique T1110: Brute Force

When account credentials are unknown, attackers may use a brute force attack in order to gain access. This can occur as an early stage of their attack, to gain initial access, or ...

How to Solve the Password Problem

An Overhaul in Password Security Passwords aren’t going anywhere. Despite the buzz that biometrics and MFA are holistic solutions, passwords are a ubiquitous, crucial layer for authentication—and they’re low-cost and simple, too.  That’s ...

The Exploitation of Privileged Accounts 

The flow of news about data breaches and ransomware attacks is relentless. Businesses of all sizes—large companies included—continue to suffer. Not only do cyber attacks lead to financial damage, but they have ...
API security, API, cloud, audits, testing, API security vulnerabilities testing BRc4 Akamai security pentesting ThreatX red team pentesting API APIs Penetration Testing

Palo Alto Networks Issues BRc4 Attack Simulation Tool Warning

The Unit 42 research arm of Palo Alto Networks this week reported a Brute Ratel C4 (BRc4) adversarial attack simulation tool is being used by cyberattackers to evade detection. Peter Renals, principal ...
Security Boulevard