Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Best Practices for Securing Git LFS on GitHub, GitLab, Bitbucket, and Azure DevOps

Git Large File Storage (Git LFS) is an open-source Git extension that handles versioning for large files. It optimizes git repositories by storing data separately from the repository’s core structure, making it much easier for developers to manage binary assets. However, such an efficiency requires proper security and configuration to function optimally. Utilizing best practices, like access control, encrypted connections, and regular repository maintenance, firmly secures the Git LFS performance.

Why Controversial Phishing Emails Do Not Work

Frequently, when a cybersecurity training manager sends out a controversial simulated phishing attack message that angers a bunch of employees and ends up making headlines, we get called by the media to comment on the story. Here are some examples of potentially controversial simulated phishing messages: I have read many stories of security awareness training managers sending simulated phishing emails with these types of messages, often around Christmas or other national holidays.

MobiFin and INETCO partner to deliver cutting-edge digital banking and payments security

MobiFin, a leading provider of unified digital banking and payment solutions, has entered into strategic partnership with INETCO, an innovative real-time transaction monitoring and fraud prevention company. INETCO has established a significant global footprint by implementing its innovative solutions across more than 27 nations, serving some of the most prominent financial powerhouses worldwide.

Building a Scalable Permissions Service: Overcoming Challenges in Access Control

Permissions are at the center of every operation at Egnyte. Every interaction any user has with the system is bound to go through a stringent permission check,be it creating a file, copying it, moving it, sharing it, deleting it or using an operation as simple as adding comments. The permissions model is extremely crucial as without it, data leaks, incorrect access escalations, and unauthorized operations can occur.

CrowdStrike Named a Leader in 2024 Frost Radar for Cloud-Native Application Protection Platforms

Frost & Sullivan has recognized CrowdStrike as a leader in its Frost Radar for Cloud-Native Application Protection Platforms (CNAPP) for the third consecutive year. CrowdStrike Falcon Cloud Security continues to set the standard for securing hybrid and multi-cloud environments, as evidenced by our placement at the forefront of both the Innovation Index and Growth Index.

FBI Warns of Cybercriminals Using Generative AI to Launch Phishing Attacks

The US Federal Bureau of Investigation (FBI) warns that threat actors are increasingly using generative AI to increase the persuasiveness of social engineering attacks. Criminals are using these tools to generate convincing text, images, and voice audio to impersonate individuals and companies. “Generative AI reduces the time and effort criminals must expend to deceive their targets,” the FBI says.

The Rise of Phishing Attacks: How New Domain Extensions Are Fueling Cyber Crime

In recent years, the world of cybersecurity has witnessed a concerning trend: a significant increase in phishing attacks. A new study reveals that these attacks have surged by nearly 40% in the year ending August, 2024. What's particularly alarming is the role played by new generic top-level domains (gTLDs) in this spike. While gTLDs like.shop, .top, and.xyz make up only 11% of new domain registrations, they account for a staggering 37% of reported cybercrime domains.

New Measures Signal Progress for Stalking Victims in the UK

The Home Office has introduced new guidance aimed at strengthening protections for stalking victim-survivors in England and Wales. Under the updated measures, police will be required to inform individuals if they uncover the identity of a stalker, including those operating anonymously online. Additionally, stalking protection orders will be toughened to prevent convicted stalkers from contacting their victims while in prison.

ISO 27001 Audit Checklist: What Can You Expect?

The full process for achieving ISO 27001 compliance is lengthy, expensive, and difficult. While you can take many steps to make it easier, faster, or cheaper, there’s only so much you can sidestep the ground-level legwork that needs to be done to succeed. Fortunately, we can help you smooth out the process. A few weeks ago, we published a checklist for the full process to achieve ISO 27001 certification.