New BPFDoor Controller Enables Stealthy Lateral Movement in Linux Server Attacks

Cybersecurity researchers have unearthed a new controller component associated with a known backdoor called BPFDoor as part of cyber attacks targeting telecommunications, finance, and retail sectors in South Korea, Hong Kong, Myanmar, Malaysia, and Egy… Continue reading New BPFDoor Controller Enables Stealthy Lateral Movement in Linux Server Attacks

Posted in Uncategorized

Product Walkthrough: A Look Inside Wing Security’s Layered SaaS Identity Defense

Intro: Why hack in when you can log in?
SaaS applications are the backbone of modern organizations, powering productivity and operational efficiency. But every new app introduces critical security risks through app integrations and multiple users, crea… Continue reading Product Walkthrough: A Look Inside Wing Security’s Layered SaaS Identity Defense

Posted in Uncategorized

Streamlining detection engineering in security operation centers

A proper detection engineering program can help improve SOC operations. In this article we’ll discuss potential SOC issues, the necessary components of a detection engineering program and some useful metrics for evaluating its efficiency. Continue reading Streamlining detection engineering in security operation centers