Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

US Coast Guard Reveals Large Vessel Suffered a Cyber Attack

On Monday, July 8, the Coast Guard issued a Marine Safety Alert claiming a vessel was struck by malware back in February. The craft is described as a 'deep draft' vessel on an international voyage which was struck by a "significant cyber attack" on its way to the Port of New York and New Jersey. Fortunately, the crew avoiding losing total control of the ship.

Magecart Attack Hits 960 e-Commerce Stores

Security researchers have discovered an automated Magecart digital skimming campaign that compromised over 960 e-commerce stores in less than 24 hours. Sanguine Security Labs found that the widespread Magecart campaign breached almost 962 e-commerce stores customers' payment details, including full credit card data, names, phone numbers, and billing addresses.

Financial Sector Facing Record Number of Cyber Attacks

Financial services companies in the UK reported over 819 cyber incidents to the Financial Conduct Authority in 2018, a stark increase compared to just 69 reported the previous year. Among those hit, the hardest was retail banks (486), representing almost 60% of the total reported attacks. Followed by wholesale financial markets who reported 115 incidents and retail investment firms who reported 53 incidents.

State of Cybersecurity Today

Today, the majority of our critical systems are intertwined with each other and are administrated by/through computers. Many decisions are automated and our lives are to some extent reliant on IoT connected devices. A great deal of our data is on cloud storage facilities and almost all of our personal data is stored in a device that has internet connection. The connectivity and complexity of these systems make them vulnerable. That is why cybersecurity has been gaining more and more importance.

A Guide to Mobile TLS Certificate Pinning (2019)

Cybersecurity professionals know what they’re up against. The type, number and severity of cyberattacks grows with time. Hackers display no shortage of cunning and ingenuity in exploiting security vulnerabilities, compromising important data and inflicting damage to both individuals and organizations. Cybersecurity professionals also know that their defenses must evolve along with the attacks, requiring them to display even more ingenuity than hackers when creating security tools.

Dolos DNS Rebinder: What You Need to Know

Although DNS rebinding attacks have been known for over a decade now, they are only recently receiving attention as a practical attack surface. In the last year, quite a few popular products have been shown to lack DNS rebinding protections, and as a result, someone could operate them remotely using a malicious web site. Manufacturers have made a habit of giving consumers connected devices that are controlled by unauthenticated HTTP requests via the local network.

Critical Cyber Security features that your business needs to survive

Recent statistics show that 60% of businesses are forced to suspend operations after a cyber-attack are never able to reopen for business. This is largely due to revenue lost due to downtime as well as damage to the company’s reputation. The good news is that most of these threats can be mitigated with reliable cybersecurity. When it comes to cyberattacks, time is of the essence.

Siegeware and BAS attacks, an emerging threat

As technological solutions to cybercrime become increasingly advanced, able to preempt attacks and weed out vulnerabilities before they’re widely known, attackers also become more adept at cloaking their presence and concealing their intent. The targets of attacks also change with the times.

Making it Rain - Cryptocurrency Mining Attacks in the Cloud

Organizations of all sizes have made considerable shifts to using cloud-based infrastructure for their day-to-day business operations. However, cloud security hasn't always kept up with cloud adoption, and that leaves security gaps that hackers are more than happy to take advantage of.