Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Conti ransomware incapacitates Costa Rica's government: The FBI, CISA, the NSA, and Secret Service recommend mitigation strategies

Weeks after President Rodrigo Chaves Robles became Costa Rica’s 49th president, he had to tackle the country’s largest cyberattack ever. Costa Rica declared a state of emergency following a series of detrimental ransomware attacks carried out by the Conti ransomware gang.

How confident are you in managing your devices securely over the internet?

Managing roaming users from a central point has always been daunting. Enterprises found it easy when they had to manage devices inside a network. Having firewalls on either side of the boundaries and restricting susceptible APIs and network packets, businesses found it convenient to manage their devices. Is this a realistic scenario today? Enterprises are evolving. Work patterns have inclined towards modern approaches. Hybrid work patterns are the encouraged mode for working.

Microsoft zero-day vulnerability, Follina (CVE-2022-30190), exploited in the wild: Here's all you need to know

Follina—while we’re sure this commune in Italy is lovely, the same can’t be said about this new vulnerability by the same name for InfoSec folks. Thanks to a zero-day bug in the Microsoft Support Diagnostic Tool, Follina is now making the headlines but for all the wrong reasons. This blog talks in detail about the zero-day vulnerability in Microsoft Support Diagnostic Tool (MSDT), popularly known as Follina.

Cyber risk score: Learn how to quantify your organization's cyber resilience

Imaging you’re applying for a loan. One of the important criteria required to obtain approval is the credit score. The higher the credit score, the higher your chances for getting a loan. Similarly, imagine you’re selling a product on a website. Potential buyers judge the quality of your product based on the reviews or ratings it has received from other customers. The higher the ratings, the higher the chances people will buy your products or services.

Chip away at age old-password problems by reinventing your security strategies

Despite wide-spread knowledge on the risk of using a weak password, 123456 is still a common password in use by a number of users. You’re probably wondering who would still use this password. Well, close to 103 million people around the world according to NordPass’ report. While this is alarming, let’s just take a moment to consider why users choose simple, easy-to-remember passwords despite being aware of the risks. Password overload: How big of a concern is it?

Are your Apple devices safe from the latest vulnerabilities?

Apple has recently released OS updates for multiple operating systems, addressing known and exploited security vulnerabilities along with previously unknown ones. During the past week, various data security organizations like the US Cybersecurity and Infrastructure Security Agency and Indian Computer Emergency Response Team have issued warnings asking users to install the latest updates on their Apple devices as soon as possible to avoid possible exploitation of devices and device data.

Featured Post

Port scanners and open ports: What you should know

When it comes to securing your network from intrusion or attacks, one of the most commonly followed security measures is to regularly scan your network ports and close all open ports. This is because open ports can expose your network to several security vulnerabilities. To tackle the risks introduced by open ports, network admins rely on port scanners. Port scanners help you identify, inspect, and analyze network ports, and aid in reducing your network's attack surface by closing open ports. This makes port scanners an indispensable tool to ensure network security. In this post, we discuss what open ports are, their vulnerabilities, and how you can defend your network with port scanners.

Canadian privacy laws revisited: Is your organization staying ahead of the curve?

Illustrated by Dorathe Victor The Personal Information Protection and Electronic Documents Act (PIPEDA) is well-known if you are an organization based out of Canada. In place for more than 20 years, it sets out rules for how businesses should collect, use, and disclose personal information while dealing in commercial activities. Some pieces of personally identifiable information (PII) that are protected under PIPEDA are name, age, ID number, income, ethnic origin, blood type, and more.

Protecting your Microsoft 365 services against NOBELIUM attacks [E-book]

In December 2020, Microsoft came forward with details regarding what is now being considered the most extensive, severe cyberattack in history—the NOBELIUM attack. This shocking security breach by NOBELIUM, a group of Russian hackers, brought the cybersecurity world to a standstill with its well-planned and well-executed hacking. It compromised several organizations through a supply chain attack.