Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

BADBOX Botnet Is Back

Imagine this: you're at home, eagerly waiting for the new device you ordered from Amazon. The package arrives, you power it on, and start enjoying all the benefits of 21st century technology—unaware that, as soon as you powered it on, a scheme was unfolding within this device. Welcome to the world of BADBOX. BADBOX is a large-scale cybercriminal operation selling off-brand Android TV boxes, smartphones, and other Android electronics with preinstalled malware. What does this mean?

Securing Your Healthcare Supply Chain: A Guide to Supply Chain Detection and Response

The Evolving Threat Landscape In today’s interconnected healthcare landscape, supply chain security has emerged as a critical concern. Cyber threats are becoming increasingly sophisticated, targeting vulnerable points in the supply chain to infiltrate networks and steal sensitive patient data. As a result, healthcare organizations must prioritize the security of their vendors and partners to protect their own operations and patient information. What is Supply Chain Detection and Response?

Riscosity and Microsoft Azure: A Powerful Partnership for Data Security

This collaboration is a significant step forward in making robust data security accessible to all organizations. By leveraging the Azure Marketplace, we're empowering Azure customers to easily discover, deploy, and integrate Riscosity into their existing infrastructure. This seamless integration allows for a streamlined experience and faster time to value.

Emerging Threats in Cybersecurity: Safeguarding Software from Evolving Risks

In the digital-first landscape of today, cybersecurity threats are getting increasingly advanced and widespread, posing serious risks that could have adverse impacts on organizations the world over. Businesses are conducted through complex software systems and are increasingly susceptible to such attacks. Attackers continue refining their phishing scams and advanced persistent threats to exploit new vulnerabilities. Of the many, one such covert threat comprises malicious code, which recently has emerged as a permanent feature that requires proactive ways of lessening its impact.

A Day in the Life of a CISO: An Employee Email Discovered in a Password Dump

The notification lands in my SecurityScorecard dashboard just as I’m wrapping up a meeting. An employee’s email address has shown up in a password dump on a dark web monitoring feed. Another day, another reminder of why cybersecurity is a full-contact sport.

Difference Between Supply Chain Detection & Response (SCDR) vs. Managed Detection and Response Services (MDR)

In today’s cybersecurity landscape, organizations face an ever-growing variety of threats, many of which originate from their supply chains. Traditional cybersecurity measures like Managed Detection and Response (MDR) have been widely adopted, but newer, more advanced approaches like Supply Chain Detection and Response (SCDR) are redefining how businesses tackle external risks.

Day in the Life of a CISO: Evaluating a Plugin Vendor

It’s mid-morning, and I’m making good progress when an email from a department head pops into my inbox. They’re thrilled about a new plugin that promises to streamline workflows for one of our most critical platforms. Naturally, they need me to sign off on the vendor’s security posture before they can move forward. I get it—business efficiency is important, but so is ensuring we don’t invite unnecessary risk into our environment.

How SecurityScorecard's Supply Chain Detection and Response Protects Financial Institutions

As financial institutions continue to expand their digital ecosystems, the growing reliance on third-party vendors and service providers introduces significant cyber risks. With a majority of data breaches linked to vulnerabilities in the supply chain, managing these risks has become a necessity.