Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

July 2024

10 Thought-provoking Questions to Contemplate GenAI Data Security

In the age of generative AI, data security is a key concern for organizations to manage. In my previous blog post, I dug into how modern SSE technology helps to better secure genAI. The recently published ebook Securing GenAI for Dummies offers further clarity on strategies organizations can use when it comes to securing and enabling genAI apps. With that in mind, we’ve compiled 10 essential questions to keep in mind as you assess your data security, along with how Netskope can help address them.

3 trends shaping the future of GRC and how to adapt today

For many teams, managing governance, risk, and compliance (GRC) is still a very manual process. As a security leader, you might be wondering how to future-proof and scale your GRC program when so much of your team’s time is spent on collecting screenshots or copying and pasting information from one spreadsheet to another. ‍ The future of GRC management doesn’t have to be more of the same though.

New Phishing Platform Targets Microsoft 365 Accounts at Financial Firms

Analysis of the latest phishing-as-a-service (PhaaS) platform ONNX Store highlights just how successful these platforms can be. Security analysts at threat intelligence vendor Eclectic IQ have been tracking ONNX Store, noting it’s a rebranded evolution of the Caffeine PhaaS platform. According to analysis, ONNX has been used to target financial institutions, “including banks, private funding firms and credit union service providers across the EMEA and AMER regions.”

Amazon-Related Scams Spike Ahead of Prime Day

Researchers at Check Point observed more than a thousand newly registered malicious or suspicious web domains related to Amazon last month. The criminals are likely gearing up to target users during Amazon Prime Day next week. “While Prime Day offers incredible savings, it is crucial for shoppers to remain vigilant, exercise caution while clicking on links or providing sensitive information, and ensure they are navigating legitimate platforms,” the researchers write.

The Importance of Security Culture: When Telecom Giants Resort to Malware

I recently read a story about a South Korean telecom company that pushed out malware to over 600,000 of its customers who were using torrents to share files, in a bid to limit their file-sharing capabilities. Users reported that their files went missing, random folders appeared, and in some cases, their PCs were disabled.

WatchGuard Endpoint Security Wins 2024 Fortress Cybersecurity Award

We’re delighted to share that Business Intelligence Group has recognized WatchGuard Endpoint Security as a 2024 Fortress Cybersecurity Award winner! The annual awards program recognizes the world's leading companies and individuals who are at the forefront of cybersecurity innovation. Winners are selected based on their dedication to developing solutions, raising awareness, and defending against the growing threat of cyberattacks.

Binary secret scanning helped us prevent (what might have been) the worst supply chain attack you can imagine

The JFrog Security Research team has recently discovered and reported a leaked access token with administrator access to Python’s, PyPI’s and Python Software Foundation’s GitHub repositories, which was leaked in a public Docker container hosted on Docker Hub.

What To Do if Your Password Appears in a Data Leak

If your password has appeared in a data leak, there are several things you should do, starting with changing your password. You may be wondering, “How would I even know if my password was in a data leak?” If you have an iPhone and save your passwords on your iCloud Keychain, you might have seen this message before: This password has appeared in a data leak, which puts this account at high risk of compromise. You should change your password immediately.

Bitbucket Exports And Imports Explained

As one of the leading platforms for distributed version control, Bitbucket is a hub that helps DevOps teams collaborate on code. This critical data, including source code, digital data, and we shouldn’t forget metadata that helps them to see the full picture of their work, is vital for their operations and business continuity. So, should they have the possibility to seamlessly import this data from Bitbucket and export to Bitbucket? The answer is yes.