Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Blogs

37 Arrested as Police Smash LabHost International Fraud Network

Police have successfully infiltrated and disrupted the fraud platform "LabHost", used by more than 2,000 criminals to defraud victims worldwide. A major international operation, led by the UK's Metropolitan Police, has seized control of LabHost, which has been helping cybercriminals create phishing websites since 2021 to steal sensitive information like passwords, email addresses, and bank details.

Supply Chain Cybersecurity - the importance of everyone

I’m always surprised – and a little disappointed – at how far we have to go before supply chain cybersecurity gets the respect and attention it deserves. I sat down this week with a new client who wanted some help addressing several internal issues surrounding their IT systems. When I asked them about their relationship with the supplier – essentially, how was their supply chain cybersecurity? - their response was not only worrying but, unfortunately, quite typical.

MagicDot: A Hacker's Magic Show of Disappearing Dots and Spaces

Microsoft Windows is the world’s most widely used desktop operating system (OS). It accounts for more than 70% of market share as of February 2024, according to market research firm Statista, and can be found on more than 1.4 billion active devices. As with any software vendor, Microsoft continuously evolves their OS with the release of updated versions that offer new features and functionality.

Responsibilities of a modern CISO

The role of a Chief Information Security Officer (CISO) is critical in an interconnected business environment. A modern CISO will ensure that their organization is well-prepared to handle the myriad of cybersecurity challenges it faces. It is multifaceted, extending beyond traditional IT security to encompass various responsibilities to protect an organization's information assets.

Netskope Security Service Edge: Once Again Highest in Execution, Furthest in Vision!

Today we are excited to announce that Netskope has once again been named a Leader in the Gartner® Magic Quadrant™ for Security Service Edge (SSE). This is the third time in a row Netskope has been recognized as a Leader—and we have been recognized as a Leader every time since the inaugural Magic Quadrant for SSE. We’ve also placed highest in vision and furthest in ability to execute for the second time in a row.

Must Have Features Your ASM Platform Must Have - Part 1

What is ASM, sometimes called EASM? A simple definition of External Attack Surface Management (ASM or EASM) is the process of defining and securing your organization from the outside-in. Your organization’s attack surface is made up of all the assets belonging to your organization, all of your vendor-managed assets, Cloud and SaaS assets, and all of their external third-party, fourth-party, and Nth-party connections that are visible to an outsider.

Key takeaways from the 2024 Phishing Threat Trends Report

Our latest Phishing Threat Trends Report gives a comprehensive oversight into the types of phishing attacks and tactics organizations are facing so far in 2024, from the rise of ‘quishing’ and AI-powered phishing campaigns to the multi-channel approach. In this blog, we look at the key findings from the report, the industries and demographics most at risk, and the evolution of payloads from 2021 to date.

Is OneDrive Safe? What You Need to Know About OneDrive's Privacy Policy

How often do you read and review the terms and conditions when signing up for a service? Or stay updated with the privacy settings of companies that monitor your data? We often hit the accept button to complete the signing-up process as quickly as possible so we can start using the product, whether it be for cloud storage, streaming, or video games. In doing so, we often risk putting our data in the company's control, leaving us unsure about how exactly they use this data or how they keep it secure.

LastPass Warns of Deepfake Phishing Attempt

LastPass has warned that one of its employees was targeted by a social engineering attack that used an audio deepfake that impersonated the company’s CEO. Fortunately, the employee grew suspicious and avoided falling for the attack. Mike Kosak, Senior Principal Intelligence Analyst at LastPass, explained in a blog post, “In our case, an employee received a series of calls, texts, and at least one voicemail featuring an audio deepfake from a threat actor impersonating our CEO via WhatsApp.