atlas news
    
Security Boulevard
19  avril     22h43
Baby ASO: A Minimal Viable Transformation for Your SOC
Anton Chuvakin    Vaguely relevant but very cyber image from Dall E One pattern I spotted after looking at the evolution of IT and security organizations over the years, including my time at Gartner is: change is hard, but transformation is harder. Perhaps it is an IT Axiom of some sort, with a Theorem I that...
    19h46
LabHost Phishing Platform is Latest Target of International Law Agencies
Jeffrey Burt    The takedown this week of a massive phishing as a service PhaaS operation spanned law enforcement agencies from both sides of the Atlantic and is the latest example of an increasingly aggressive approach by authorities to disrupt the operations of high profile cybercriminal gangs. Agencies from...
    19h17
Choosing SOC Tools? Read This First [2024 Guide]
Shriram Sharma    Security operations centers SOCs are the front lines in the battle against cyber threats. They use a diverse array of security controls to monitor, detect, and swiftly respond to any cyber menace.These controls are essential for keeping information systems safe around the clock. Modern SOCs in...
    19h00
USENIX Security ’23 GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation
Marc Handelman    Authors Presenters: Sina Sajadmanesh, Ali Shahin Shamsabadi, Aurélien Bellet, Daniel Gatica Perez Many thanks to USENIX for publishing their outstanding USENIX Security ’ Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events...
    18h56
SafeBreach Coverage for AA24-109A (Akira Ransomware)
Kaustubh Jagtap    FBI, CISA, EC , and NCSC NL issued an urgent advisory highlighting the use of new TTPs and IOCs by the Akira ransomware group. The post SafeBreach Coverage for AA A Akira Ransomware appeared first on SafeBreach. The post SafeBreach Coverage for AA A Akira Ransomware appeared first on...
    17h53
Taking Time to Understand NIS2 Reporting Requirements
Brian Robertson    The newest version of the European Union Network and Information Systems directive, or NIS , came into force in January . Member States have until October to transpose it into their national law. One of the most critical changes with NIS is the schedule for reporting a cybersecurity...
    17h00
Daniel Stori’s WC’
Marc Handelman    via the inimitable Daniel Stori at Turnoff.US Permalink The post Daniel Stori’s WC’ appeared first on Security Boulevard.
    15h00
USENIX Security ’23 Inductive Graph Unlearning
Marc Handelman    Authors Presenters: Cheng Long Wang, Mengdi Huai, Di Wang Many thanks to USENIX for publishing their outstanding USENIX Security ’ Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the...
    14h52
From DAST to dawn: why fuzzing is better solution Code Intelligence
Natalia Kazankova    Security testing allows you to evaluate the robustness of applications and systems and identify potential weaknesses that attackers may exploit. DAST and fuzzing are two popular, important, and proven security testing methods. DAST dynamic application security testing searches for security...
    13h00
Cybersecurity Insights with Contrast CISO David Lindner 4 19 24
David Lindner, Director, Application Security    Insight One of the most significant errors an organization can make is assuming they are not a target. This belief is especially prevalent among small and medium sized businesses SMBs , and it represents a dangerous oversight. An estimated of SMBs reported experiencing at least one...