Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

December 2024

Is Your Hospital Sharing Patient Data with Facebook? A Guide for Security and Privacy Teams

Recent lawsuits have revealed a critical privacy concern for healthcare providers – the sharing of patient data with Facebook through tracking pixels. We wrote this article to help your security and privacy teams assess their risk, identify key stakeholders, and understand the urgency of this issue.

How to develop and secure Cloud apps?

How can businesses build cloud applications that are both reliable and secure? Organizations face a dual challenge: they must develop scalable solutions and protect sensitive data. As more businesses migrate to cloud-based infrastructures, they must adopt strong cloud solutions development and security practices. These steps help them maintain operations and preserve customer trust. In this article, we guide you through proven strategies and best practices. We show how you select the right architecture and implement advanced security measures.
Featured Post

Navigating the Evolving Threat Intelligence Landscape and Organisational Responsibility

Cyber Rhino Threat Week (which took place from 9th to 13th December 2024) aims to inform, sharing threat intelligence insights and best practices with our customers, partners and industry ecosystem. This keynote session certainly set the stage for the week, exploring the complexities that organisations must consider when establishing and operating an effective Cyber Threat Intelligence (CTI) program. The panel discussion examined how diverse organisational structures, responsibilities, priorities, and desired outcomes influence the role and integration of CTI.

Bumblebee Malware is back with evolving tactics: How EventLog Analyzer can help protect your organization

In a surprising development, Bumblebee Malware (a popular malware downloader) has resurfaced with an approach that was believed to be long gone: VBA macro-enabled documents. This comes just four months after Europol dismantled various trick bots—including Bumblebee, IcedId, Pikabot, TrickBot and systemBC—during a crackdown called Operation Endgame.

Acronis True Image - The Only Secure Backup Enhanced with Integrated Protection

We’ve all heard it: “It’s not if something will happen, but when.” The question is, are you ready? With Acronis True Image, you already have the tools to protect your digital life — now let’s take it to the next level. Home computers must be protected against multiple cyberthreats — including system failure and malicious hackers. With Acronis True Image, you can completely protect your home and home office environments with one simple tool. Designed for today’s threat landscape, Acronis True Image is the most reliable, efficient, and easy way to protect and manage your computers, mobile devices and digital life.

Email Bombing: Why You Need to be Concerned

Over the last few months, the topic of email bombing has been brought to our attention multiple times, mostly queries from customers that go something like this: “I have a few users experiencing some sort of spam attack, where they are receiving thousands of random registration or subscription emails. What do I do, and why is it occurring? Help!” This scenario is known as email or subscription bombing.

Decoding SEBI's CSCRF: VAPT and Steps to Cyber Resilience

The Securities and Exchange Board of India (SEBI) has raised the bar on cybersecurity with its newly introduced Cybersecurity and Cyber Resilience Framework (CSCRF), effective August 20, 2024. For regulated entities (REs)—including stockbrokers, depositories, asset managers, and alternative investment funds—the framework not only requires compliance but also lays out a clear path toward resilience. These new guidelines require REs to implement VAPT and risk management, among other mandates.

Proactive cybersecurity leadership: Implementing the NIST Cybersecurity Framework (CSF)

According to a recent Gartner report, 88% of boards view cybersecurity as a business risk, not just an IT issue, underscoring the critical need for organizations to adopt robust, scalable frameworks to manage cybersecurity risks. In today’s rapidly evolving threat landscape, frameworks like the NIST Cybersecurity Framework (CSF) are pivotal for safeguarding organizations from vulnerabilities while maintaining alignment with business objectives.