Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

New Phishing Platform Targets Microsoft 365 Accounts at Financial Firms

Analysis of the latest phishing-as-a-service (PhaaS) platform ONNX Store highlights just how successful these platforms can be. Security analysts at threat intelligence vendor Eclectic IQ have been tracking ONNX Store, noting it’s a rebranded evolution of the Caffeine PhaaS platform. According to analysis, ONNX has been used to target financial institutions, “including banks, private funding firms and credit union service providers across the EMEA and AMER regions.”

What is NGFW? Next generation firewall VS traditional firewall

Protecting an organization’s network perimeter has become increasingly complex. Traditional firewalls, once the cornerstone of network security, are now being supplemented and often replaced by more advanced solutions known as Next-Generation Firewalls (NGFWs). At Obrela, we believe in leveraging cutting-edge technologies to safeguard digital assets, and understanding the differences between traditional firewalls vs NGFWs is crucial for any robust security strategy.

WatchGuard Endpoint Security Wins 2024 Fortress Cybersecurity Award

We’re delighted to share that Business Intelligence Group has recognized WatchGuard Endpoint Security as a 2024 Fortress Cybersecurity Award winner! The annual awards program recognizes the world's leading companies and individuals who are at the forefront of cybersecurity innovation. Winners are selected based on their dedication to developing solutions, raising awareness, and defending against the growing threat of cyberattacks.

What is Web Scraping and How It Works?

Confused and want to know what in the world web scraping is and how it works? Well you’ve come to the right place because we’re about to lay down everything for you. Before we dive in, I can already tell you the short version: Web scraping is the process of extracting publicly available data from a website. Join us to learn more about the specifics, how it works, and popular libraries that exist.

Bitbucket Exports And Imports Explained

As one of the leading platforms for distributed version control, Bitbucket is a hub that helps DevOps teams collaborate on code. This critical data, including source code, digital data, and we shouldn’t forget metadata that helps them to see the full picture of their work, is vital for their operations and business continuity. So, should they have the possibility to seamlessly import this data from Bitbucket and export to Bitbucket? The answer is yes.

Introducing the Styra DAS Terraform Provider

Gartner projects that by 2026, 80% of software engineering organizations will have established platform engineering teams. The vision of platform engineering is ambitious: to empower developers with all the flexibility they need while minimizing complexity. This approach has already transformed infrastructure, deployment, data analytics, encryption management, authentication, and more.

RADIUS/UDP vulnerable to improved MD5 collision attack

The MD5 cryptographic hash function was first broken in 2004, when researchers demonstrated the first MD5 collision, namely two different messages X1 and X2 where MD5(X1) = MD5 (X2). Over the years, attacks on MD5 have only continued to improve, getting faster and more effective against real protocols. But despite continuous advancements in cryptography, MD5 has lurked in network protocols for years, and is still playing a critical role in some protocols even today.

The Importance of Security Culture: When Telecom Giants Resort to Malware

I recently read a story about a South Korean telecom company that pushed out malware to over 600,000 of its customers who were using torrents to share files, in a bid to limit their file-sharing capabilities. Users reported that their files went missing, random folders appeared, and in some cases, their PCs were disabled.