• Ease of work in an end-to-end cybersecurity platform 

    Ensuring your organization is secure, and stays that way, is not an easy job. There [...]

  • MOVEit’s Zero Day: The File Transfer Turmoil

    Executive SummaryMultiple vulnerabilities in MOVEit Transfer tracked as CVE-2023-34362, CVE-2023-35036, and CVE-2023-35708 were found.Mentioned vulnerabilities are [...]

  • SOX Cybersecurity Compliance – What is it?

    SOX or The Sarbanes-Oxley Act (SOX) was passed in 2002 in the USA and requires [...]

  • What is SIEM? The Ultimate Guide to Security Information and Event Management

    Data protection and cyber threat detection are crucial for businesses in today's landscape. Security Information [...]

  • Uncoiling the Enigma of Russian Intelligence’s “Snake Malware”

    You could be forgiven for thinking it's the month of snake, as the Russian Intelligence’s [...]

  • Emerging Threat: Vice Society’s Double Extortion Strategy

    Executive Summary Vice Society is a relatively new Russian-speaking hacking group that arose in the [...]

  • Introducing JSON Parser: Master your JSON data-types

    With the advent of cloud and container technologies, businesses and organizations are adopting them at [...]

  • BCS for SAP: Enhanced security monitoring and threat detection

    Securing your SAP systems and applications is one of our top priorities. We want you [...]

  • Detecting and Responding to Compromises in Azure AD through AAD Connect

    Most organizations have infrastructures that span both on-premise and the cloud. To manage identities across [...]

  • PaperCut Vulnerability CVE-2023-27350: Detecting exploitation attempts

    by Anish Bogati & Rabindra Dev Bhatta, Security Research - Updated May 8th 2023PaperCut is [...]

  • Phishing: Logpoint SOAR deep dive – Achieving a 77% reduction in time to resolution

    Phishing is a cyber-attack where an adversary sends fraudulent emails, text messages, or other electronic [...]

  • Emerging Threat: RedLine Stealer Malware Outbreak – A Comprehensive Guide to Anatomy, Detection, and Response

    By Swachchhanda Shrawan Poudel & Anish Bogati; Security ResearchRedLine Stealer, the malicious software that was [...]