Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How Egnyte Got Its Engineers to Use a New Configuration System

You can build the best system in the world, but it won’t matter if no one uses it. That might sound obvious, but it’s often overlooked. Getting your users to buy into a new system is not as easy as flipping a switch. It takes planning, initiative, and reinforcement to make sure your software is broadly adopted.

Grinch bots have already stolen the countdown to Christmas

In a recent Quarterly Index report, Netacea’s Threat Research Team listed the top five scalper bot targets of Q3 2021 and predicted the items most sought after by bots for Black Friday and the festive shopping season. But scalper bots (or grinch bots) have already been hard at work ahead of Christmas, depriving genuine consumers of luxury advent calendars and limited-edition toys in the run up to peak retail period.

How businesses can protect themselves from DDoS attacks

In Distributed Denial of Service (DDoS) a system or network is flooded with online traffic from multiple sources in an attempt to make it unavailable. Cybercriminals take advantage of protocol or DNS server vulnerabilities that they exploit to launch attacks. Moreover, in larger scale attacks, they may use malware that infects thousands of hosts that target the victim to block it, all of them with different IP addresses, which is known as a botnet.

Four Insider Threats Putting Every Company At Risk

Few concerns keep business leaders up at night like the threat of a cybersecurity incident. With the average cost of a data breach exceeding $4 million for the first time and public sentiment, regulatory requirements and practical functionality firmly against companies that can’t protect their digital landscape, many leaders are reprioritizing cybersecurity in response to this increasingly urgent reality.

New Exchange RCE vulnerability actively exploited

Exchange admins now have another exploit to deal with despite still reeling from a number of high profile attacks this year including ProxyLogon and ProxyShell. A new high severity Remote Code Execution (RCE) exploit for on-premise Exchange Servers has been published and is being actively exploited in the wild.

ManageEngine Vulnerability Manager Plus simplifies compliance with the CIS Benchmarks

New software and assets introduced into your network are, by default, configured to be multifunctional and convenient to use, but they’re not always the most secure. IT teams also make constant changes to systems’ configurations, leading to inevitable security gaps. Maintaining secure configurations in assets and software is essential for organizations that want to avoid potential cyberattacks or face costly audit penalties.

Securing your open source dependencies with the Snyk Visual Studio Code extension

We’re pleased to announce new functionality within the Snyk Vulnerability Scanner extension for Visual Studio Code, making it easier for developers to find and fix vulnerabilities and license issues in their open source dependencies! To help developers take more responsibility for the security of their applications, security tools must be able to integrate seamlessly into existing workflows and the tools developers are using on a day-to-day basis.

Integration of the ThreatQ platform into McAfee Enterprise infrastructure

Proper management of threat data is critical in today’s security operations and modern SOCs. The knowledge of threats, their priority in our environment, their management, and the ability to analyze them, will give us anticipatory capabilities we wouldn’t have without this management.

Cybersecurity and its impact on the home

The digital society is ever-expanding, and with that has come an ever-increasing risk of cyber attack. This is a factor coming more and more into focus, with the rate and strength of cyberattacks set to continue escalating according to one Al Jazeera report. A further risk vector is becoming apparent through the smart home - more and more people are making their home a natural extension of the digital world, and placing a lot of reliance on the web and smart tech.