Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

DCRat Targets Users with HTML Smuggling

DCRat (also known as Dark Crystal RAT) is a modular remote access Trojan (RAT) which is offered as malware-as-a-service (MaaS) and has been around since 2018. It is written in C# and has typical RAT and information stealing capabilities, such as executing shell commands, logging keystrokes, exfiltrating files and credentials, among others.

The most effective attack surface management tools and techniques

The ability to manage and monitor your attack surface is no longer a luxury—it’s a necessity. The rapid expansion of networks, coupled with the shift to cloud computing and remote work, has created a vast and ever-changing attack surface that requires constant vigilance. This article delves into the most effective attack surface management tools and techniques, offering insights into how they can bolster your cyber security posture and safeguard your organisation against evolving threats.

Rubrik and Pure Storage Join Forces to Deliver Complete Cyber Resilience of Mission-Critical Data

Data has become organizations' lifeblood. However, with the exponential growth of data comes unprecedented challenges in securing it across both short-term and long-term storage. To make matters worse, cyber threats are evolving rapidly, and businesses need robust solutions to safeguard their critical data. We're excited to announce a groundbreaking partnership between Rubrik and Pure Storage.

CISA Warns of Hackers Targeting Industrial Systems with "Unsophisticated Methods" Amid Lebanon Water Hack Claims

The US Cybersecurity and Infrastructure Security Agency (CISA) has warned that malicious hackers continue to be capable of compromising industrial control systems (ICS) and other operational technology (OT) using "unsophisticated methods" - suggesting that much more still needs to be done to secure them properly.

Ten Ways You Can Avoid Debit Card Fraud

Having your debit card information stolen or used by someone else to impersonate you can be stressful and damaging to your finances and identity. To avoid becoming a victim of debit card fraud, you should secure your bank accounts with strong passwords, use your credit card for purchases, be cautious of phishing scams and more. Continue reading to learn what debit card fraud is and how to avoid becoming a victim of it.

Deep Dive into the Latest API Security Vulnerabilities in Envoy

Envoy has carved out a critical role in cloud-native computing, becoming increasingly prevalent as the default ingress controller for Kubernetes. This high-performance proxy, developed by Lyft and now part of the Cloud Native Computing Foundation’s arsenal, is integral for companies scaling up their Kubernetes deployments. Envoy ensures efficient load balancing, security, and operational agility by managing external access to services within Kubernetes clusters,.

Complexity of Attack Surface Management in Cloud Environments

Legacy attack surfaces were small and simple. There were fewer servers and endpoints to protect. The tooling required to secure it was basic – perimeter firewalls, antivirus software, and server/network/application monitoring tools. When organizations migrate to the cloud, things change and become complex. For starters, on-premise infrastructure and applications can’t be left out in favor of the cloud. Most organizations run hybrid setups.