Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Gambling away your data: What we know about the Las Vegas cyberattacks

MGM Resorts has announced that it will be shutting down 12 of its hotels and casinos in and around Las Vegas. The reason—a ransomware attack of unknown magnitude on servers containing a goldmine of customer data. MGM reports that it managed to detect the breach at a fairly early stage and notify the authorities and law enforcement, but the damage incurred is yet to be evaluated.

Staying ahead of LockBit ransomware attacks

LockBit is a Ransomware as a Service (RaaS) provider accountable for most LockBit ransomware attacks in 2023. The LockBit RaaS group came into existence in 2019 and has posed great challenges to security experts ever since. A recent report states that LockBit accounted for over one-third of all ransomware attacks in the latter half of 2022 and the initial quarter of 2023.

Top 5 features to look for in an advanced network port scanner

Network security has become paramount in safeguarding sensitive data and ensuring maximum efficiency in organizations today. As port scanning attacks increase, it’s important to stay vigilant to protect your enterprise systems from such threats. One essential tool that every network admin should have is the advanced network port scanner, which can help to identify and assess network port and switch port vulnerabilities.

ManageEngine recognized as a Challenger in the 2023 Gartner Magic Quadrant for Privileged Access Management

We are excited to tell you that ManageEngine has been named a Challenger in the 2023 Gartner Magic Quadrant for Privileged Access Management. We believe this recognition reflects ManageEngine’s commitment to deliver a full-fledged privileged access management (PAM) experience for the modern enterprise. The Gartner Magic Quadrant evaluates vendors in a specific market and positions them based on their ability to execute and their completeness of vision.

Comply with India's Digital Personal Data Protection Act using Endpoint Central

Many countries across the globe are realizing the importance of the right to privacy in the digital era. The GDPR, the data privacy legislation for the European Union, came into force in 2018 and became the guiding star for an array of privacy laws. The Digital Personal Data Protection Act (DPDPA) by the Indian government is the latest privacy law aimed at protecting individuals’ privacy while ensuring hassle-free business operations.

The new master mind of cybercrimes: Artificial intelligence

Imagine an AI overlord sitting in a dark basement, plotting world domination through cybercrime. While the idea might seem like a sci-fi flick, it’s actually closer to reality than we think. AI has emerged as a game changer in a constantly evolving cyber landscape. AI algorithms can learn and adapt to security measures quickly, making them the ultimate cyber villains.

Five worthy reads: What's cooking between cookie consent and user privacy?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week we explore website cookies, their role in managing user identity and behavior, and the key ingredients to a safe cookie policy. There’s no worse way to enter a website than to be met with a cookie consent encounter. But how many of us click “Accept All” without much thought, just to rid ourselves of the interruption?

The MOVEit Transfer vulnerability affects 40 million people worldwide

In over 600 data breaches, 40 million individuals were affected across the globe due to the MOVEit Transfer vulnerability. Between June 2023 and the present day, healthcare information, educational records, financial records, personal information, Social Security numbers, and insurance details have been either stolen or wiped out by threat actors who abused the MOVEit Transfer vulnerability.

Adopting the 5S strategy in cybersecurity

The 5S strategy has long been considered a reliable approach to workplace organization. Originated and developed as a strategy to facilitate just-in-time manufacturing in post-war Japan, 5S is widely used today to improve efficiency and overall productivity across many industries. Companies known for their precision, discipline, and attention to detail, such as Toyota, have extensively implemented the 5S methodology to promote clutter-free, organized, and regulated work environments.