Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What Steps You Need to Take to Make Retrieval Augmented Generation (RAG) Safe

The arrival of generative AI has opened many exciting possibilities. From workflow optimization to customer interaction, generative AI offers all sorts of options that could transform an almost limitless number of businesses. But if you've ever spent much time trying to put generative AI to work, you've probably realized that it's not quite so simple - and that it has its limitations. And as with any technological innovation, there are important security considerations you need to take into account if you're going to keep your system and your users safe.

Threat Actor Uses Fake CrowdStrike Recovery Manual to Deliver Unidentified Stealer

On July 22, 2024, CrowdStrike Intelligence identified a Word document containing macros that download an unidentified stealer now tracked as Daolpu. The document impersonates a Microsoft recovery manual.1 Initial analysis suggests the activity is likely criminal.

Protiviti and BlueVoyant Forge Strategic Partnership to Reinforce Cybersecurity Service Offerings Powered by the Microsoft Security Platform

We're excited to announce that Protiviti, a global leader in consulting services and recognized authority in Microsoft compliance and identity, has formed a strategic partnership with BlueVoyant, an industry-leading MXDR Sentinel services provider, that additionally offers an AI-driven cyber defense platform.

Sysdig Threat Research Team - Black Hat 2024

The Sysdig Threat Research Team (TRT) is on a mission to help secure innovation at cloud speeds. A group of some of the industry’s most elite threat researchers, the Sysdig TRT discovers and educates on the latest cloud-native security threats, vulnerabilities, and attack patterns. We are fiercely passionate about security and committed to the cause. Stay up to date here on the latest insights, trends to monitor, and crucial best practices for securing your cloud-native environments.

Password Management for Healthcare Professionals

Password management in the healthcare industry is essential for maintaining the privacy of patient and employee information. HealthITSecurity reports that in just the first three months of 2024, there were over 115 data breaches in the healthcare industry. One of the most recent and largest data breaches in healthcare impacted over 2.3 million patients of Medical Management Resource Group at the end of 2023.

UPS Text Scam Examples

Some examples of UPS text scams include confirming details about a fake delivery, fake package delivery notifications, fake package delivery fee requests, fraudulent suspicious activity on your UPS account or an error with a delivery. According to the Federal Trade Commission (FTC), in 2023, over $650 million was lost to imposter scams, including UPS text scams. Keep reading to find out what different UPS text scams look like and how you can stay protected against this kind of scam.

Cloudy with a Chance of Hackers: Protecting Critical Cloud Workloads

For many enterprises, cloud resources are becoming the data center's core. As these resources grow, it can be difficult for IT staff to keep up with daily administrative tasks, let alone learn the skills to provide security protections. So, how does one protect a variety of workloads in the cloud without having to worry about security misconfigurations?

Keeper Wins Connect Password Manager Test

Keeper Security has once again proven its excellence by winning a group test of leading password managers conducted by Connect in Germany. The comprehensive evaluation, which included nine password managers, saw Keeper emerge as the clear “test winner” for its outstanding security, features and usability. This latest German accolade follows closely behind Keeper’s win in the CHIP Magazine’s Password Manager Test for a second consecutive year.

Unleash the Power of Application-Level Visibility: Your Secret Weapon for Conquering Cloud Chaos

Are you tired of playing whack-a-mole with cloud security risks? Do endless compliance reports and alert fatigue leave you feeling overwhelmed? It's time to ditch the outdated, reactive approach and embrace a new era of cloud security that's all about proactive visibility. The Missing Piece: Understanding Your Cloud Applications Imagine this: you have a crystal-clear view of every application running in your cloud environment.