Tag: Cybersecurity

As the industry has gotten better at locking down endpoint devices such as laptops, threat actors are finding new ways to infiltrate an organization’s systems—and they’re seeing more and more success. From the widespread compromise of Ivanti VPNs to a string of cyberattacks involving vulnerabilities in on-premises firewalls, this year has seen threat actors increasingly…

Read More

The advisory recommends that Snowflake customers perform hunting activities for malicious activity in their systems. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning about the recent threat actor campaign targeting users of Snowflake and urging customers to proactively look for malicious activity. In the advisory, CISA pointed to a post from Snowflake on…

Read More

Penetration testing is a cornerstone of any mature security program and is a mature and well understood practice supported by robust methodologies, tools, and frameworks. The tactical goals of these engagements typically revolve around identification and exploitation of vulnerabilities in technology, processes, and people to gain initial, elevated, and administrative access to the target environment.…

Read More

‘CISOs that have been struggling with security and compliance tell us all the time that this is exactly what they need,’ says Aqueduct Technologies CTO Shane O’Brien. ‘This is a compliance game changer for customers.’ Aqueduct Technologies Chief Technology Officer Shane O’Brien is no longer surprised by the look of amazement he gets from CISOs…

Read More

Live Nation disclosed that its Ticketmaster subsidiary was impacted by ‘unauthorized activity within a third-party cloud database environment.’ Live Nation disclosed Friday that its Ticketmaster subsidiary was impacted by malicious activity in a cloud database operated by a third party, which resulted in the theft of company data. CRN reached out to Ticketmaster for further…

Read More

The content of this post is solely the responsibility of the author.  LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article.  The critical role of security testing within software development cannot be overstated. From protecting personal information to ensuring that critical infrastructure remains unbreachable,…

Read More

“We have no evidence suggesting this activity was caused by any vulnerability, misconfiguration, or breach of Snowflake’s product,” according to the vendor. Snowflake has responded to reports that Ticketmaster and Santander Bank were breached through the data cloud vendor, saying in a Friday blog post, “We have no evidence suggesting this activity was caused by…

Read More

For the week ending May 31, CRN takes a look at the companies that brought their ‘A’ game to the channel including T-Mobile, CloudFlare, Cisco Systems, Lenovo and CoreWeave, along with all the companies that made this year’s CRN Solution Provider 500. The Week Ending May 31 Topping this week’s Came to Win is T-Mobile…

Read More

The company says the acquisition of BastionZero will enable Cloudflare to introduce ‘zero trust’ infrastructure access to its secure access service edge platform. Cloudflare announced Thursday that its acquisition of passwordless authentication startup BastionZero will enable it to introduce “zero trust” infrastructure access to its secure access service edge (SASE) platform. Boston-based BastionZero was founded…

Read More

The content of this post is solely the responsibility of the author.  LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article.  In today’s digital world, businesses face the challenge of managing ever-expanding volumes of data efficiently and securely. Traditional on-premise storage solutions often come…

Read More