Extended detection and response (XDR) captures threat data from previously isolated security tools throughout the organizations tech stack to enable easier, faster triage and efficacy in investigation, threat hunting, and accurately responding to incident before it gets out of hand. By unifying threat detection data and tools and strengthening capabilities and context to respond quickly
Organizations are increasingly considering response capabilities within NDR solutions for dealing with threats detected through network traffic analytics tools, which are mostly focused on only detecting threats, and are largely focused around the core variations of known threats. NDR security solutions offer the added layers of network-level protection and threat prevention capabilities organizations mostly need
Towards the end of November, a researcher from Alibaba discovered a fault (CVE-2021-44228) in a well known open-source logging library called Log4j. The researcher responsibly disclosed his finding to Log4j’s Apache Software Foundation. An additional vulnerability (CVE-2021-45105) was also discovered in a patch released to fix the initial vulnerability. This was then followed with yet another
Apple has released a patch for ‘zero-click vulnerability. What is a ‘zero-click’? It is a flaw which lets hackers access devices through the iMessage service even if users do not click on a link or file. One can imagine the power of this loop-whole. In a statement, Ivan Krstić, head of Apple Security Engineering and
This is a very serious leak as VPN (Virtual Private Network) username and passwords could undoubtedly allow the bad actors to access a network to perform all manner of activities including stealing date (data exfiltration), install hidden malware or perform ransomware attacks to extort money. Although the exploit relates to an already patched loop-whole, you should
A report from Citizen Lab about two zero iMessage vulnerabilities/exploit which require zero click, in spyware sold by the cyberweapons NSO Group. iMessage is the the default messaging app of Apple iPhone. It appears these attacks do not require victim to do anything. They neither click on a link or open a file. The victim receives