Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

February 2024

Streamlining the Cybersecurity Maturity Model Certification (CMMC)

Nearly four years ago, the Department of Defense released the Cybersecurity Maturity Model Certification (CMMC). This was created as a complement to NIST SP 800-171, which focused on protecting Controlled Unclassified Information (CUI). If you are unfamiliar with what constitutes CUI, the simple way to think of it is to apply the broadest terms of privacy to any information that relates to any government relationship with a company.

Managing Financial Crime Risks in Digital Payments

The emergence of innovative Financial Technology (FinTech) has spearheaded rapid growth in the digital payments sector. In recent years, global payment revenues exceeded valuations of $2.2 trillion, with a steady Compound Annual Growth Rate (CAGR) expected in the next five years. There is no denying the convenience benefits that the digital transformation of payments has brought consumers and businesses.

Microsoft Teams: The New Phishing Battlefront - How Attackers Are Exploiting Trusted Platforms

Attackers are abusing Microsoft Teams to send phishing messages, according to researchers at AT&T Cybersecurity. “While most end users are well-acquainted with the dangers of traditional phishing attacks, such as those delivered via email or other media, a large proportion are likely unaware that Microsoft Teams chats could be a phishing vector,” the researchers write.

81% of Underwriters Expect Cyber Insurance Premiums to Increase as Risk is Expected to Soar

New data from cyber insurance underwriters shows what they think the biggest threats will be in 2024 and what organizations should do about it. Because insurance underwriters analyse lots of risk data to make decisions about insurance premiums and policies, it makes sense to hear their perspective on 2024’s outlook will be. According to insurer Woodruff Sawyer’s Cyber Looking Ahead Guide 2024, there’s some good news and some bad news.

Swipe Left on These 6 Most Popular Online Dating Scams

While online dating scams may be a relatively new concept, tales of heartbreak are as old as time. Now, there’s a multi-billion dollar industry dedicated to romantic films, music, and, dating apps. By the end of 2023, dating apps will have reached over 400 million users, generating over $8 billion in revenue through dating, casual dating, and matchmaking services.

Customize your Access Policies with DataTrails

Signing up with DataTrails comes with the ability to share your audit trails with your business partners, other applications, and your internal team. Access policies control users, apps & organizations’ read & write privileges to provenance data in DataTrails. If you’re using an integration, access policies offer a way to fine-tune these integrations, giving specific permissions to add to and read your records.

CVE-2024-21893: New Ivanti Zero-Day Vulnerability Actively Exploited

On January 31, 2024, Ivanti published an article disclosing two high severity vulnerabilities: CVE-2024-21893: A server-side request forgery flaw present in the SAML component of Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons. This vulnerability allows an unauthenticated threat actor to access restricted resources. Ivanti reports that a limited number of customers have been affected by this vulnerability.

Improving domain discovery with new connectors

Our new domain connector simplifies and expands support for organizations integrating cloud providers to Detectify. Security teams can now have even greater confidence in the security posture of their attack surface, with increased visibility into the identification, inventorying, and continuous monitoring of the latest vulnerabilities and exposures.

Free API Discovery & Threat Detection Tool From Graylog!

In the fast-evolving landscape of digital connectivity, Application Programming Interfaces (APIs) play a pivotal role in facilitating seamless communication between diverse software systems. As organizations increasingly rely on APIs to power their applications, robust API security becomes paramount.