Cybersecurity

CrowdStrike to Buy Israeli Data Defense Vendor Flow Security

Cloud-Native Application Protection Platform (CNAPP) , Data Loss Prevention (DLP) , Endpoint Security Data Security Posture Management Deal Will Help CrowdStrike Guard Endpoints, Clouds Michael Novinson (MichaelNovinson) • March 5, 2024     CrowdStrike plans to purchase a data security posture management startup led by an Israeli Defense Forces team leader to safeguard information across […]

Cybersecurity

Purple teaming and the role of threat categorization – Help Net Security

Organizations constantly work to ensure optimal threat detection and prevention across their systems. One question gets asked repeatedly: “Can we detect the threats we’re supposed to be able to detect?” Red team assessment, penetration testing, and even purple team assessments (in their current form) are all designed to answer these questions. Unfortunately, as attacks get […]

Cybersecurity

FCC Enforces Stronger Rules to Protect Customers Against SIM Swapping Attacks

Nov 17, 2023NewsroomFraud Prevention / Mobile Security The U.S. Federal Communications Commission (FCC) is adopting new rules that aim to protect consumers from cell phone account scams that make it possible for malicious actors to orchestrate SIM-swapping attacks and port-out fraud. “The rules will help protect consumers from scammers who target data and personal information […]

Cybersecurity

Proofpoint to Buy Tessian to Infuse Email Protection With AI

Data Loss Prevention (DLP) , Email Security & Protection , Email Threat Protection Acquiring Tessian Will Help Proofpoint Thwart Misdirected Emails, Misattached Files Michael Novinson (MichaelNovinson) • October 30, 2023     Proofpoint has agreed to purchase a cloud email security provider founded by HSBC, RBS, Santander and UBS alumni to apply artificial intelligence to […]

Cybersecurity

Researcher Reveals New Techniques to Bypass Cloudflare’s Firewall and DDoS Protection

Firewall and distributed denial-of-service (DDoS) attack prevention mechanisms in Cloudflare can be circumvented by exploiting gaps in cross-tenant security controls, defeating the very purpose of these safeguards, it has emerged. “Attackers can utilize their own Cloudflare accounts to abuse the per-design trust-relationship between Cloudflare and the customers’ websites, rendering the protection mechanism ineffective,” Certitude researcher […]

Cybersecurity

Logic Flaws Let Attackers Bypass Cloudflare’s Firewall and DDoS Protection

The effectiveness of Cloudflare’s Firewall and DDoS prevention has been proven to be compromised by an attack technique that takes the use of logical vulnerabilities in cross-tenant security policies. This finding has sparked worries about possible vulnerabilities that could damage the security company’s clients. How Does the Cloudflare Attack Work? The attack only requires the creation […]