Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

BDRSuite v7.1.0 is Generally Available Now!

We are excited to announce that BDRSuite v7.1.0 is now generally available! This latest release brings a host of new features, enhancements, and performance improvements designed to provide even more robust and efficient data protection for your IT environment. With BDRSuite v7.1.0, users can expect enhanced backup and recovery capabilities, greater ease of use, and increased reliability.

Celebrating 10 years of Project Galileo

One of the great benefits of the Internet has been its ability to empower activists and journalists in repressive societies to organize, communicate, and simply find each other. Ten years ago today, Cloudflare launched Project Galileo, a program which today provides security services, at no cost, to more than 2,600 independent journalists and nonprofit organizations around the world supporting human rights, democracy, and local communities.

How To Protect Your Bank Account

Online banking, while convenient, comes with cybersecurity risks. Bank accounts are susceptible to account takeover attacks, which happen when a hacker gains access to the account and changes the credentials. This prevents the account owner from accessing their bank account and allows the hacker to make unauthorized purchases or access other, linked accounts. According to the American Bank, account takeover fraud is expected to cause losses of more than $343 billion worldwide between 2023 and 2027.

Snyk and AWS announce native Amazon EKS support directly from the AWS Management Console

We’re excited to announce that Snyk has now developed an AWS Marketplace add-on for Amazon Elastic Kubernetes Service (Amazon EKS), embedded directly into the AWS Management Console! Snyk joins a small number of approved ISVs around the globe, allowing customers to deploy a Snyk agent on Amazon EKS clusters using the same methods you would use to deploy native AWS services, either manually via the AWS Management Console or by using AWS’ command-line interface (CLI).

Heightened Exploit Attempts on Check Point's Recent VPN Zero-Day Vulnerability

A significant surge in exploitation attempts targeting a newly disclosed information disclosure flaw in Check Point's VPN technology has been observed recently. This has underscored the urgent need for organizations to address the vulnerability immediately.

Salt Security Leading the Way in AI-Driven API Security for Next-Generation Threat Protection and Attacker Insights

In today's digital landscape, organizations face constantly evolving threats, and modern applications are built on APIs, making robust API security a top priority. Salt Security, a trailblazer in AI-powered API security, is at the forefront of addressing this challenge with our innovative platform. The recent introduction of advanced LLM-driven attacker insights further solidifies Salt's position as a leader in API security solutions.

Security Flaws Discovered in Popular WooCommerce Plugin

Patchstack has recently identified multiple security vulnerabilities in the WooCommerce Amazon Affiliates (WZone) plugin. Created by AA-Team, this widely-used premium WordPress plugin has garnered significant popularity, amassing over 35,000 sales. It serves as a crucial asset for website owners and bloggers aiming to monetize their sites through the Amazon affiliate program.

Introducing the Rego extension for the Zed editor

Let’s go straight to the TL;DR: we have just released a new Rego extension for the popular Zed editor! Providing both syntax highlighting and all the language server features of Regal that were previously available for editors like VS Code, or Neovim. The extension is available from the Zed extensions view, and you’ll find it by searching for “Rego”.

Business email archiving: Compliance and accessibility

This is why email compliance and archiving solutions are pivotal for shielding your electronic correspondence and ensuring it’s safely stored, retrievable, and compliant with industry regulations. The adoption of such solutions is indispensable for both private and public companies that generate large data volumes, which require extensive storage and reliable backup options for the reasons we’ll explain below.

CIO POV: Building Resilience in a Complex Threat Landscape

As a CIO, I often wish for a world where the threat landscape is less expansive and complicated than it is today. Unfortunately, the reality is quite different. This month, I find myself particularly focused on the idea that our digital business would come to a grinding halt without the technology ecosystem that supports it. However, this very ecosystem also presents significant risks.