Conti Ransomware Shuts Down Operation, Splinters into Smaller Groups

Summary The notable ransomware gang known as Conti has, according to security firm Advanced Intel (AdvIntel), taken its infrastructure offline and shut down its ransomware operations. While public-facing ‘Conti News’ data leak and the ransom negotiation sites are still online, the Tor admin panels used by Conti members to perform negotiations, publish news, and generate…

Read More

Apache Tomcat CVE-2022-25762 Advisory

Context On May 12, 2022, Apache released an advisory regarding a high severity vulnerability in Apache Tomcat. The vulnerability, designated CVE-2022-25762, affects Tomcat versions 9.0.0.M1 to 9.0.2o and 8.5.0 to 8.5.75. Apache advises users to upgrade to 9.0.21 or later or 8.5.76 or later to mitigate the vulnerability. A May 16, 2022 advisory from CISA…

Read More

Connecticut Becomes Fifth U.S. State to Pass Data Privacy Law

Context On May 4, 2022, Connecticut became the fifth U.S. state to pass a set of data privacy rules and regulations aimed at protecting the privacy of its constituents. The bill, S.B. No. 6: Act Concerning Personal Data Privacy and Online Monitoring, joins similar legislative pieces passed in California, Virginia, Colorado and Utah. This rising trend…

Read More

Understanding Client-Side Risk on your eCommerce Website: What’s Happening on the Payment Page?

Security spend for eCommerce companies grows year on year, and according to data researched by BigCommerce, 77% of businesses bought new security tools in the last year, and 69% have added security headcount to their teams. However, is this security being targeted in the right direction? In particular – how much attention do you put…

Read More

Remove the Adversary Advantage with Zero Trust

For many enterprises, zero trust has emerged as the North Star of modern cybersecurity frameworks, designed to help organizations reduce their attack surface and risk by applying principles of least privilege or a “never trust, always verify” approach. Some zero trust-based security controls, like multi-factor authentication (MFA), are designed to add layers of login defense…

Read More