Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How to Use MITRE ATT&CK to Mitigate API & Other Attacks?

With a threat landscape expanding at an accelerated pace, it is next to impossible for any organization to even keep track of and monitor the volume, frequency, complexity, and breadth of the attack techniques and tactics out there. But to effectively tackle threats and protect mission-critical assets, the knowledge of these common attack techniques, tactics, detection, and mitigation is critical. This is where MITRE ATT&CK is especially useful.

How To Secure Your Files for Back to School? Cybersecurity Tips for Students

While online learning provides many positive opportunities for learners and teachers alike, it is more important than ever to strengthen cybersecurity defenses to deal with new and emerging attacks. As school is back in session, now is a good time to double-check that you’re doing everything necessary to keep your data (and your homework) secure online.

Kroll CFO report reveals high cost of business overconfidence around cyber risk

Our new CFO cybersecurity survey, which surveyed 180 CFOs, CEOs and other financial executives worldwide, has highlighted the fact that Chief Financial Officers are very confident in their companies’ abilities to ward off cyber security incidents, despite being underinformed on the cyber risk their businesses face. Almost 87% of the surveyed executives expressed this confidence, yet 61% of them had suffered at least three significant cyber incidents in the previous 18 months.

Everything about the Online Skill Based Gaming Laws in India

According to a recent government assessment, India needs a regulatory body to oversee and categorise online gambling websites. The study, which was created by a committee of senior officials under Prime Minister Narendra Modi, advocated for involvement and tougher categorization of India’s online gaming industry.

Addressing the Cybersecurity Skills Shortage

In 2021, there were an estimated 4.19 million cybersecurity professionals in the workforce — an increase of more than 700,000 since 2020. This welcome growth suggests businesses are now taking online threats more seriously than ever. But while the cybersecurity workforce is growing, it’s still a long way from where it should be. Skills shortages in cybersecurity are currently the highest on record.

PCI DSS Readiness Assessment

The PCI Council has set a robust framework comprising a comprehensive set of requirements for enhancing the security of payment card data. So, prior to performing the final PCI DSS Audit, most Level 1 Merchants conduct a PCI Readiness Assessment. This is to validate the effectiveness of their security implementation and the readiness for the final audit.

Stories from the SOC - C2 over port 22

The Mirai botnet is infamous for the impact and the everlasting effect it has had on the world. Since the inception and discovery of this malware in 2016, to present day and all the permutations that have spawned as a result, cybersecurity professionals have been keeping a keen eye on this form of Command and Control (C2 or CnC) malware and associated addresses.

EV Code Signing without Hardware Token - Is It Possible?

Organizations utilize the EV Code Signing Certificate to secure the software with the highest standard. Although to configure it for digital sign and timestamping, a hardware token gets issued from the CA. However, there can be chances that someone lost that Token or forgot its passcode, or anything unexpected happens. No company wants to go through such a situation. And to prevent it, they started to find the Extended Validation Code Signing without Hardware Token.

How to Optimize Governance and Data Security in Microsoft 365 and Teams

The last few years have seen a huge shift in how organizations work with their data. The COVID pandemic accelerated a digital transformation as workers transitioned from the office to home-based and back into hybrid working environments. With this new set-up, collaboration is key to worker efficiency. However, the adoption of Microsoft 365 and Teams as a front-end platform has created new challenges for security teams.