Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Efficiently uncover network device threats and ensure a safer IT environment

According to a study by Microsoft, more than 80% of enterprises have experienced at least one firmware attack in the past three years. Is your enterprise’s security posture secure? Does your security software manage and defend all your endpoints from vulnerabilities?

Check the cyber insurance readiness of your organization

The rise in the frequency and intensity of cybercrime has seen many organizations turning to cyber insurance to help protect against the extent of financial losses following a cyberattack. While identifying and adopting a comprehensive cybersecurity strategy is crucial, even the most secure networks can still be exploited by adept hackers. According to reports, the global cyber insurance market is projected to grow from $11.9 billion in 2022 to $29.2 billion by 2027.

The troubles of being on Cloud9: Why your browsers are not safe

With the new browser botnet, Cloud9, waiting to penetrate your browsers remotely to access and steal your sensitive and confidential data, it can be challenging to stay safe while browsing the internet. As reported by Bleeping Computer, this Remote Access Trojan named Cloud9 allows cyberattackers to execute commands remotely to steal your data. This malicious extension is not found in the Chrome store, but has been reported to be installed by other means. What’s the story of Cloud9?

5 advantages of deploying a cloud SIEM solution

As organizations are rapidly moving to the cloud to leverage the cloud advantage, services are also moving to the cloud, including cybersecurity solutions such as SIEM. In fact, SIEM as a Service is rapidly gaining momentum as an alternative to traditional, on-premises SIEM solutions. In its 10 Questions to Answer Before Adopting a SaaS SIEM report, Gartner had predicted that by 2023, 80% of SIEM solutions will have capabilities that are delivered via the cloud.

Great Power(Shell) doesn't always come with great responsibility: Sometimes, SIEM is all you need

Fileless threats are on the rise. These threats occur when cybercriminals use pre-existing software in victims’ systems to carry out attacks, instead of using a malicious attachment or file. More often than not, a criminal’s favorite tool for a fileless attack is PowerShell.

Safeguard your Active Directory using MITRE ATT&CK techniques

Active Directory (AD) handles sensitive organization data like user credentials, personal information of employees, security permissions, and more. Because of this, AD is prone to being targeted by cyber attackers. Malicious actors are constantly coming up with new attack strategies, making it a challenge for organizations to secure their AD environment. This is why it’s essential that every organization formulates a cyber defense strategy to combat cyber threats and protect their AD.

ManageEngine wins at the Cybersecurity Breakthrough Awards 2022!

It gives us immense pleasure to announce that ManageEngine has been declared a winner in the Cybersecurity Breakthrough Awards 2022. ManageEngine ADAudit Plus, our IT security and compliance solution, was the winner in the User Behavior Analytics Security Solution category. The Cybersecurity Breakthrough Awards aim to recognize the top companies, products, technical innovation, and people that break through the crowded cybersecurity industry.

Are you fishing for tips to thwart phishing scams?

“You’ve inherited a fortune. To transfer the money, I need your bank account credentials.” If you have ever stumbled across something like this, you need to continue reading. According to Verizon’s 2022 Data Breach Investigations Report, 25% of all data breaches consistently involve phishing. How does this happen? The fraudsters who are involved in phishing are some of the best content writers.