Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

New York Unit of Worlds Largest Bank Becomes Ransomware Victim

The ransomware attack on ICBC Financial Services caused disruption of trading of U.S. Treasuries and marked a new level of breach that could have massive repercussions. When we saw the attack on the Colonial Pipeline back in 2021, the impact was felt throughout the Southeast United States. Any attack on key businesses that keeps an economy running will have some form of impact should the attack be successful.

Don't Be Fooled By This Sneaky Disney+ Scam

A phishing campaign is impersonating Disney+ with phony invoices, according to researchers at Abnormal Security. The phishing emails targeted individuals at 22 organizations in September. “The first step in this multi-stage attack is a seemingly auto-generated notification email informing the target of a pending charge for their new Disney+ subscription,” the researchers explain.

MOVEit Breach Creates More Victims; 105k Records Stolen from Insurance Group

The Pan-American Life Insurance Group (PALIG) provides various insurance plans across the states and beyond. PALIG employs more than 2,100 staff and has a 110-year history of providing insurance to those needing it. Companies and individuals turn to PALIG in their time of need, and PALIG returns the favor by providing high-quality insurance options.

90% of Energy Companies Experienced a Third-Party Breach

More than two years after the major U.S. pipeline ransomware incident, the SecurityScorecard Threat Research, Intelligence, Knowledge, and Engagement (STRIKE) Team has released a new report revealing that 90% of the largest global energy companies have experienced a third-party breach in the past 12 months. This research highlights the uphill battle faced by the energy industry in combating emerging threats across the supply chain.

Third-Party Data Breach Response Playbook

The risk of data breaches has become an omnipresent concern for businesses and organizations. And as technology continues to evolve, so do the tactics of cybercriminals. One critical aspect of cybersecurity strategy involves preparing for and responding to third-party data breaches. A well-constructed response playbook is indispensable in mitigating the potential damages and ensuring a swift recovery.

Reflecting on 2023: Evolving our Product, Deepening Partnerships, and Staying Committed to the Security Community

As the new year approaches, security professionals and analysts alike are taking a step back to review what has transpired over the past twelve months. At Devo, 2023 was an exciting year full of change and progress. As we look forward to 2024, we want to take some time to reflect on Devo’s year across product enhancements, analyst recognition, partnerships, and community engagement.

Understanding Polymorphic Viruses and Their Impact on Cybersecurity

Polymorphic virus is one of the hardest to find and most dangerous types of malware. This is because they can change into different forms. Because these advanced threats can change their code in a special way, they are very hard for standard signature-based antivirus systems to find. Polymorphic viruses, on the other hand, use dynamic code encryption and constant change to avoid being found by even the most advanced tools.

Centripetal Partners With Tiger to Provide Cutting-Edge Cybersecurity Innovation to the UK Market for the First Time

Centripetal announces that its award winning, patented cybersecurity threat solution is available for the first time ever across the UK as a result of its strategic partnership with Tiger. With this partnership, Tiger and its customers will have a stronger approach to cybersecurity, putting operationalised threat intelligence at the forefront, moving from a reactive to proactive defence, and helping security teams be more efficient and effective.