Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

January 2025

John Graham-Cumming at Web Summit: Empowering developers - Focus on innovation, not infrastructure

More and more companies are moving away from traditional cloud architecture to envision a new cloud that's more specialised to individual workloads and data needs, but what does it take to build more personalised and streamlined infrastructure? Join Cloudflare CTO John Graham-Cumming as he explores the next generation of cloud architecture and breaks down how it will lessen developers' burdens.

John Graham-Cumming at WebSummit: Making security simple

In today’s modern workplace, employees connect from anywhere, often using both personal and company devices and a mix of managed and unmanaged apps to stay productive. This dynamic creates a patchwork of unsecured endpoints and raises the stakes for data protection. Cultivating a seamless security culture requires solutions that blend naturally with how people work. How can we make security behaviours effortless, so they become second nature, embedding safety at every level of the organisation?

CVSS 3.1 vs CVSS 4.0: A Look at the Data

Like the cost of groceries and everything else, CVSS scores seem to have experienced some inflation recently. CVSS 4.0 promises to be a better calculator of risk than previous iterations of the system, but that’s only true if you use it in its full capacity to calculate your specific risk within your specific environment. Most of us aren’t using it that way.

Create Instant, Scalable, and Cost-Effective Value for MSSP Customers

This blog was originally published on MSSP Alert on November 20, 2024. Imagine being able to offer your customers instant value for selecting your MSSP over others. This sounds like a tricky proposition, given that organizations seeking managed security solutions can be extremely diverse. What could a medical institution need that would also benefit an energy company? Where do the needs of a tech startup and a dairy farm intersect?

What Is Vulnerability Management?

Enterprise networks frequently experience changes in endpoint devices, software, and files, which can introduce risk to the organization. To mitigate this, companies can implement foundational security controls like file integrity monitoring (FIM), which tracks changes to essential files and helps restore them if unauthorized. Additionally, organizations may use these controls to monitor for vulnerabilities introduced by new devices. However, FIM alone is not enough.

The $55 Billion Wake-Up Call: Cybersecurity Challenges Facing UK Businesses

Organizations of all types must consider and prioritize cybersecurity in order to protect against a wide range of attacks and prevent potentially catastrophic consequences. With the evolution of the threat landscape and most businesses relying more and more on technological pillars for everyday operations, cyberattacks can have impacts that extend far beyond monetary losses. However, the financial cost alone is staggering, highlighting the pressing need for improved cybersecurity across the board.

Emerging Threat: Ivanti Connect Secure CVE-2025-0282 and CVE-2025-0283

On Wednesday, January 8th, Ivanti disclosed two severe vulnerabilities affecting Ivanti Connect Secure VPN devices. Ivanti Connect Secure is an external-facing SSL VPN used to secure remote access to corporate networks. Ivanti Policy Secure is an internal network-access control solution designed for regulating access within an enterprise’s network. The critical vulnerability (CVSS 9.0) CVE-2025-0282 allows unauthenticated remote code execution (RCE) through a stack-based buffer overflow.

WordPress Two-factor Authentication Plugin | WordPress 2FA Plugin

Protect Your WordPress Site with miniOrange Two-Factor Authentication (2FA)! miniOrange’s Two-Factor Authentication (2FA) provides an extra layer of security to keep your data safe from unauthorized access. Our 2FA solution is simple, reliable, and user-friendly, ensuring only verified users can log in to your site. With more than 15+ 2FA options like OTP over SMS/email, and authenticator apps, you can choose the method that works best for you.

Endpoint Management: Best Practices to Secure Every Device Across Your Network

Endpoint management is an important part of network protection in today's digital world because everything is connected. As more devices, like computers, smartphones, and Internet of Things (IoT) gadgets, appear on the market, it becomes harder for businesses to keep their networks safe. A study from 2023 on cybersecurity says that over 70% of data breaches are caused by endpoints that have been hacked.

Is Facebook Marketplace Really Safe? Find Out

By bringing people in the same area together, online markets like Facebook Marketplace have changed the way people buy and sell things. But this ease of use comes with possible risks, which makes many people wonder: is Facebook Marketplace safe? Every day, millions of people use the site successfully, but there are also a lot of frauds, scams, and safety concerns. Statista says that over 1 billion people use Facebook Marketplace every month, which makes it a great target for hackers.

Multi-factor Authentication for Active Directory: Fighting MFA Fatigue Attacks

In 2024, cyberattacks aimed at MFA flaws increased by an astounding 40%. This concerning pattern indicates a sharp rise in the complexity of cyberthreats that businesses now have to deal with. Cybercriminals are now adopting psychological strategies in addition to technical ones, such as MFA fatigue attacks, which alter human behavior to obtain unauthorized access to vital systems. This is a wake-up call, not just a number.