Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

62% of Phishing Emails Bypassed DMARC Checks in 1H of 2024

A report from Darktrace has found that 62% of phishing emails in the first half of 2024 were able to bypass DMARC verification checks in order to reach users’ inboxes. “Building on the insights from the 2023 End of Year Threat Report, an analysis of malicious emails detected by Darktrace / EMAIL in 2024 underscores the implication that email threats are increasingly capable of circumventing conventional email security tools,” the report says.

The Cybersecurity Industry is Under Scrutiny Yet Again

Unfortunately, the cybersecurity industry has been in the crosshairs once again due to the global Microsoft outage caused by CrowdStrike’s disastrous software update on July 19th. Coincidentally, just five days following the CrowdStrike issue, the US District Court for the Southern District of New York dismissed a case involving another notable cybersecurity company, SolarWinds.

"Pastejacking" Attacks Are Becoming a Thing (Because Users are Falling for Them)

New analysis shows users can be convinced to copy and paste malicious code on behalf of the attacker. I first saw this kind of attack earlier this month – where the user is asked to launch the Run dialog box and paste in a malicious command. I never thought I'd see something similar again, but I was wrong.

Evolving cloud security: Why identity infused CDR is the key

Minimizing the time to detect, investigate and respond to threats is crucial in stopping cloud attacks. In fact, this might be the biggest understatement in cloud security today. Modern threat actors are escalating their tactics, making attacks faster, more aggressive, and increasingly difficult to stop. Cloud attacks occur at lightning speeds, leveraging automation to access sensitive data and resources before security teams can react.

1Password Extended Access Management now available to Microsoft Entra, Google Workspace customers

With remote work, bring-your-own-device, and shadow IT apps becoming commonplace, the number of unsanctioned apps and untrusted devices is rapidly climbing. And cybersecurity and IT leaders have been stuck with tools that only secured access to some applications, some devices, and some people, creating an Access-Trust Gap.

Unmatched Coverage for Cloud and Hybrid Workloads: Sysdig's Next Generation Instrumentation

In today’s rapidly changing and evolving cloud-native environments, security and infrastructure teams face challenges ranging from managing complex deployments to ensuring capability across their entirety of their diverse infrastructure. EDR and XDR tools cannot provide comprehensive coverage of cloud workloads, making them fundamentally unsuited for cloud security.

What the experts say: complexity is the greatest identity security challenge

The results of the yearly IDSA (Identity Defined Security Alliance) survey are out, revealing some surprising and insightful numbers. Let’s dive in! Identity: a growing priority Just how important is identity? The vast majority (73 percent) of respondents say it’s a top three priority, with 22 percent saying it’s the very top priority within their company’s security program.

Fireblocks x Station70: Disaster Recovery for institutional clients

Threats to digital asset security are constantly evolving. That’s why having a robust disaster recovery (DR) plan is a necessity for institutions in this space. Ensuring business continuity and safeguarding against potential disruptions is paramount when it comes to maintaining trust, integrity, and the seamless operation of services. Counterparty risk continues to be a primary concern for institutional digital asset investors.

SenseOn's Commitment to Quality Assurance: Your Security, Uninterrupted

Recent events have highlighted the importance of robust quality assurance (QA) processes. At SenseOn, we understand that any disruption to your IT operations is unacceptable and that round-the-clock security is essential. That's why we've built a comprehensive QA framework that prioritises the stability, reliability, and effectiveness of our XDR platform - ensuring we support you in growing your company.

DLP 101: What is data loss prevention, and why do you need it?

Imagine running a business that handles sensitive information, like financial data or health data. Now, think about what could happen if that data slipped out through a careless email, a file shared in the cloud, or a compromised account. This kind of data leak could result in hefty fines and a loss of customer trust. Data loss prevention products are critical from stopping this scenario from ever coming to pass.