Critical (CVSS 9.4) SQL Injection vulnerability in SonicWall GMS & SonicWall Analytics On-Prem

SonicWall has published a  hotpatch to fix two SQL injection vulnerabilities impacting the GMS (Global Management System) and Analytics On-Prem products. CVE-2022-22280 is a critical vulnerability (CVSS 9.4) that results in an Improper Neutralization of Special Elements used in an SQL command in SonicWall GMS. SonicWall Global Management System (GMS) contains a SQL Injection security […]

SonicWall Issues Patch for Critical Bug Affecting its Analytics and GMS Products

Network security company SonicWall on Friday rolled out fixes to mitigate a critical SQL injection (SQLi) vulnerability affecting its Analytics On-Prem and Global Management System (GMS) products. The vulnerability, tracked as CVE-2022-22280, is rated 9.4 for severity on the CVSS scoring system and stems from what the company describes is an “improper neutralization of special […]

France Rules That Using Google Analytics Violates GDPR Data Protection Law

French data protection regulators on Thursday found the use of Google Analytics a breach of the European Union’s General Data Protection Regulation (GDPR) laws in the country, almost a month after a similar decision was reached in Austria. To that end, the National Commission on Informatics and Liberty (CNIL) ruled that the transatlantic movement of […]

Ransomware group hacks telecom analytics firm Subex and its cybersecurity subsidiary, Sectrio

Operators of the RagnarLocker ransomware claim to have successfully compromised the systems of telecom analytics firm Subex, including its cybersecurity subsidiary Sectrio. On its dark web platform for information leaks, the group posted an .onion link that supposedly redirects users to compromised information. According to the report, the hackers managed to access multiple information systems, […]

How Data Analytics and AI Solve the Toughest Global Problems

Can technologies combining data analytics and artificial intelligence save the world from its growing problems? Yes, it is possible! Data has an essential place in the structure of the modern world. Every day, Internet users generate a massive amount of data by creating and sharing posts and making search queries. However, this is only a […]

How big data analytics helps enterprises improve cybersecurity

Big data analytics can be directed to several use cases, like marketing, talent management, sales forecasting, or in this case, cybersecurity. Let’s dig into hows and whats of it. Cybersecurity has been a headache for enterprises almost since the beginning of the business internet, but in the last couple of years the pressure has ramped […]

Data analytics firm exposed 2m Instagram and TikTok users’ data

The victims of this “data leak” also include celebrities like Alicia Keys, Loren Gray, Kylie Jenner, Ariana Grande, and Kim Kardashian. The cybersecurity team at Safety Detectives, led by Anurag Sen, discovered an unsecured ElasticSearch server belonging to IGBlade.com, a social media analytics site. The server stored scraped data of millions of social media users. […]

Hackers Using Google Analytics to Bypass Web Security and Steal Credit Cards

Researchers reported on Monday that hackers are now exploiting Google’s Analytics service to stealthily pilfer credit card information from infected e-commerce sites. According to several independent reports from PerimeterX, Kaspersky, and Sansec, threat actors are now injecting data-stealing code on the compromised websites in combination with tracking code generated by Google Analytics for their own […]

4 Potential Causes of Low BI and Analytics Adoption Rates

Anyone who has ever owned a piece of exercise equipment knows there’s a huge difference between having it and, well, actually using it. The same principle applies to business intelligence (BI) and data analytics at an enterprise level. Deploying some form of analytics software is a strong start, but it’s wishful thinking to believe employees […]

RITA – Real Intelligence Threat Analytics

  RITA is an open source framework for network traffic analysis. The framework ingests Bro/Zeek Logs in TSV format, and currently supports the following major features: Beaconing Detection: Search for signs of beaconing behavior in and out of your network DNS Tunneling Detection Search for signs of DNS based covert channels Blacklist Checking: Query blacklists […]

Tylium – Data for Intrusion Detection, Security Analytics and Threat Hunting

  These files contain configuration for producing EDR (endpoint detection and response) data in addition to standard system logs. These configurations enable the production of these data streams using F/OSS (free and / or open source tooling.) The F/OSS tools consist of Auditd for Linux; Sysmon for Windows and Xnumon for the Mac. Also included […]

VisionDirect hacked: Hackers infect domains with malicious Google Analytics code

Hackers using Google Adwords & Google Sites to spread malware VisionDirect, one of Europe’s largest online optical retailer that deals with contact lenses and eye care related products has announced that a number of its domains have suffered a data breach in which hackers stole customers’ credit card and banking data. The data breach, according […]

Netgear Router Firmware Now Collects Analytics Data

  Do you have got NightHawk R7000 Netgear router? Netgear router firmware launched a new firmware update last week for the wi-fi router model NightHawk R7000. Protection professionals found that it covered a faraway facts collection function that collects router’s analytics information and sends it to the seller (employer’s server). Also Read: Netgear offering $15,000 in […]

CompTIA Cybersecurity Analyst+ overview – behavioral analytics

CompTIA Cybersecurity Analyst (CSA+) is a vendor-neutral cyber security certification that applies behavioral investigation to enhance the general condition of IT security. The CompTIA CSA+ certification will offer a wide range of information and abilities required to configure and utilize cyber-threat observation tools, perform data analysis and decipher the outcomes to recognize vulnerabilities, threats, and […]