Not all software supply chain attacks are the same. Here are the methods attackers currently use to corrupt legitimate software through third parties.
Sigma rules allow you to detect anomalies in log events and identify suspicious activity.
Cybercriminal groups are specializing as malware developers, initial access brokers, ransomware-as-a-service providers, data brokers, and other roles.
Vulnerability disclosures often come in bunches, and unvetted patch updates can create their own problems. Here's how to assess and prioritize both.
From trusted pentesting tools to LOLBINs, attackers abuse trusted platforms and protocols to evade security controls.
SCA tools give insight into open-source software components and the vulnerabilities they have.
Server-side request forgery attacks can grant unauthorized access to web servers or cause damage and disruption. Defending against them can be relatively easy.
Java provides a means to conveniently serialize data to maintain its integrity as it's sent over a network. Attackers can exploit vulnerabilities in the deserialization process if there aren't safeguards in place.
Sponsored Links