Deep Dive – HTTP/2 Rapid Reset Attack

Deep Dive – HTTP/2 Rapid Reset Attack

Deep Dive – HTTP/2 Rapid Reset Attack HTTPS/2 Rapid Reset DDoS method Flooding targeted servers and websites The HTTP/2 Rapid Reset attack is a powerful new DDoS method that exploits weaknesses in the HTTP/2 protocol. This method enables attackers to generate...
Deep Dive – Capital One Data Breach

Deep Dive – Capital One Data Breach

Deep Dive – Capital One Data Breach Capital One Data Breach Compliance-induced false sense of security Capital One—a leader in finance—learned the hard way that even compliant systems can fail if they’re not configured correctly. In our latest Threat Talks...
Deep Dive – OKTA Data Breach

Deep Dive – OKTA Data Breach

Deep Dive – OKTA Data Breach OKTA Data Breach Even security providers aren’t immune How does a company specializing in Identity and Access Management like OKTA suffer a data breach? In this case, a service account password was inadvertently saved by an OKTA...
Deep Dive – Accellion File Transfer Appliance

Deep Dive – Accellion File Transfer Appliance

Deep Dive – Accellion File Transfer Appliance Find Threat Talks on Accellion File Transfer Appliance (FTA) Breach How compliance creates operational blind spots You’ve diligently chosen a file transfer tool that is widely trusted, certified and compliant with...
Bridging the Gap: Security and Compliance

Bridging the Gap: Security and Compliance

Bridging the Gap: Security and Compliance Find Threat Talks on Bridging the Gap What’s more important: compliance or cybersecurity? Explore the often-overlooked operational gap between compliance and actual security in episode #33 of Threat Talks. While many...