Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

February 2024

Venmo threat sees increase in fraudulent payment requests

Since January 13th, 2024, our Threat Intelligence team has seen a steep rise in the number of fraudulent payment attacks using Venmo. By hacking existing or setting up new Venmo accounts, cybercriminals are using legitimate Venmo communications to trick users into approving fraudulent payments.

Data Modernisation in Telecom: From Reactive Protection to Proactive Opportunity

In our last blog, we discussed the many challenges faced by telecom organisations in this ever-changing regulatory and technical landscape. While it is clear to see the challenges the industry faces in this digital world, there’s also a unique opportunity to solve the many problems that hold them back.

Understanding Payment Gateway Services

A payment gateway is a technology that processes and authorises card payments for businesses. Think of a card machine in a brick-and-mortar store - an online payment gateway is exactly that, but for digital transactions. Payment gateways play a crucial role in e-commerce by facilitating the secure transfer of payment information. They are responsible for encrypting sensitive data, such as credit card numbers, to ensure that transactions are secure from end to end.

The Complete Guide to AI Data Protection

In this day and age, data runs the world and the livelihood of many companies. Data has become so integral that there are many people who pay top dollar to read this data and make insights which will increase their profits by a huge amount. There are courses provided to study and understand the behemoth that is data. While it is lucrative, its sensitive content is also subject to misuse in the wrong hands.

The 443 Podcast - Episode 278 - A Door in Apple's Walled Garden

This week on the podcast, we cover Apple's recent announcement describing how they will comply with the European Union's new Digital Markets Act and what that means for the iPhone walled garden. Before that, we cover a databreach at Mercedez-Benze thanks to an alternative authentication method. Additionally, we cover the roundup of vulnerabilities in Ivanti's remote Policy Secure and Connect Secure products and how organizations should respond.

Bolstering Cyber Resilience in the US Water Sector: A Call to Action

Tomorrow, February 6, 2024, the House Homeland Security Committee will hold a hearing on securing US water systems from cyberattacks. Following last year’s widely publicized attack on the municipal water system in Aliquippa, Pennsylvania, Congress, the Cybersecurity and Infrastructure Security Agency (CISA), and industry leaders have rightly increased their focus on the unique risks facing water systems across the country.

Hacker Subcultures: Unmasking the Motivations and Methods

The world of cybersecurity is vast and teeming with a wide array of hackers who possess distinct motivations, objectives, and methods. Unfortunately, public awareness of these differences is nearly non-existent. Some individuals employ their skills for noble purposes, while others are driven by malicious intent. Let’s delve into several subcultures within the realm of hackers, exploring their unique characteristics and their roles in shaping the cybersecurity landscape.

Education Transport and Ride Share Organization Updates on 155k Breach

HopSkipDrive is an education solution that assists guardians with their unique transportation needs; from planning bus logistics to utilizing live ride-share options, HopSkipDrive is a family’s best resource for education transportation. In July 2023, HopSkipDrive received an email from an unknown actor, allegedly claiming that assailants exfiltrated information during a cyber attack.

What is a trust center? And how to use it to demonstrate trust

As your organization grows the demands on the security team increase. Many of these new demands come from prospects and customers doing their due diligence about the security measures your business has in place. Your team is then left struggling to balance a growing number of security questionnaires and customer requests while managing your everyday responsibilities.