Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Protecting Your Business from Web Scraping as a Service

Since the early days of the World Wide Web, automated scripts known as bots have been crawling cyberspace, collecting data for various purposes. Initially, these bots were designed to be helpful, cataloging information much like search engines such as Google and Bing do today. However, the volume of automated requests has grown significantly. Today, bots account for a substantial portion of web traffic, costing businesses considerable resources to handle unwanted or malicious requests.

PROXY.AM Powered by Socks5Systemz Botnet

A year ago, Bitsight TRACE published a blog post on Socks55Systemz,a proxy malware with minimal mentions in the threat intelligence community at the time. In that post, we correlated a Telegram user to the botnet operation and estimated its size at around 10,000 compromised systems. After a year-long investigation, we are shedding new light on these conclusions.

New NIST Guidelines: Rethinking Passwords

The National Institute of Standards and Technology (NIST) issued a new perspective on password management policies, recognizing that many traditional practices used to ensure password security are no longer effective. The suggested practices to eliminate include not requiring periodic password changes, reducing restrictions on special characters, and discontinuing the use of security questions for account recovery.

2024 Open Source Security Report: Slowing Progress and New Challenges for DevSecOps

Trust is the foundation of the open source community — but what happens when that trust is betrayed? When a backdoor vulnerability was found in a widespread Linux-based data compression tool, it nearly created an opportunity for malicious actors to seize control of countless computers worldwide. The vulnerability was introduced by a trusted contributor who, after years of building rapport with maintainers, ultimately exploited that trust.

Seven steps to close coverage gaps with ASPM

The old adage “knowledge is power” holds especially true in the realm of AppSec. By remaining aware of the potential threats to applications and closing gaps in coverage, AppSec teams can demonstrate to leaders that they are in a solid position to protect vital assets. However, visibility is riddled with challenges, not the least of which are highly productive developers racing to market, often using AI-generated code that contains potential security issues.

Phishing Attacks Impersonating Big Brands Starts to Zero in on Just One Brand

The latest data on brand phishing trends shows one brand dominating quarter over quarter, but also continuing to take on a larger share of the brand impersonation. Take a guess which brand tops the list as the most impersonated in phishing attacks? If you guessed Microsoft, you’d be right. You’d also have been right last quarter, and the quarter before that – according to Check Point Research.

Affordable Surveillance Solutions for Robust Commercial Security: Enhancing Protection Without Breaking the Bank

In today's dynamic business landscape, maintaining security is essential for protecting assets and ensuring safety. With rising concerns over theft and vandalism, businesses often seek solutions that are both effective and budget-friendly. Affordable surveillance solutions can significantly enhance commercial security without straining financial resources.

Mastering Sales Funnel Management and B2B Lead Generation Solutions

In today's competitive business environment, achieving consistent revenue growth requires a strategic approach to converting potential customers into loyal clients. Two essential components of this strategy are effective sales funnel management and implementing robust B2B lead generation solutions. Together, these practices enable businesses to optimize the customer journey, attract high-quality leads, and maximize conversions.

Eight Essential Steps for Securing Digital Marketing Data

When your hunches no longer work to keep up with the ongoings, especially in the digital world, data is the king to be shielded at all costs. However, as digital marketing campaigns and strategies level up, so do the risks of data breaches and hacking activities. That's why protecting your campaign materials, data, and customer information is now quite essential, and there's no other way of doing it if you want to scale your business. So, to make sure your digital marketing "assets" remain secure, here are eight practical and crucial steps you can maximize.