Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Enhancing Employee Monitoring with Ekran System's Brand-New Dashboards

Effective employee monitoring is essential for maintaining productivity and security, especially in heavily regulated industries like finance, government, and healthcare. That’s why at Ekran System we are continuously working to enhance our product’s monitoring functionality. Now Ekran System is introducing new informative and user-friendly dashboards that will help you streamline your insider threat prevention and productivity management efforts.

What is SSPM and do you need it in your stack?

SaaS adoption has skyrocketed, offering organizations undeniable advantages. But beneath the surface lurk overlooked configuration errors. Misconfigured SaaS settings create security gaps. Broad permissions, weak defaults, and forgotten accounts jeopardize your security. These issues act as open doors for breaches and unauthorized access. The sheer scale of the problem is staggering – 70% of company software now resides in the cloud.

Apple Users Become the Latest Targets of MFA Attacks

A new string of multi-factor authentication (MFA) attacks targeting the reset of Apple IDs seem to be popping up in a likely attempt to steal the victim’s digital identity and more. A recent post on Twitter/X from entrepreneur Parth Patel outlines his experience when his phone became inundated with requests to reset his Apple ID password – to the tune of over 100.

The Importance of Low Code Security in Today's Digital Landscape

In today’s rapidly evolving digital landscape, the importance of low code security cannot be overstated. As organizations increasingly rely on low code development platforms to accelerate application and software development, it is crucial to understand the significance of robust security measures.

Google Patches Pixel Phone Zero-days After Exploitation by "Forensic Companies"

Google has issued a security advisory to owners of its Android Pixel smartphones, warning that it has discovered someone has been targeting some devices to bypass their built-in security. What makes the reported attacks particularly interesting is that traditional cybercriminals may not be behind them, but rather "forensic companies" exploiting two vulnerabilities to extract information and prevent remote wiping.

Eight Common Attack Vectors Organizations Need To Be Aware Of

An attack vector, also known as a threat vector, is a way for cybercriminals to gain access to an organization’s network or system. Some common types of attack vectors that organizations need to defend against include weak and compromised credentials, social engineering attacks, insider threats, unpatched software, lack of encryption and misconfigurations. Organizations must identify all of the potential attack vectors and protect their network against them to avoid security breaches.

Webhook security checklist: How to build secure webhooks

Let’s not waste time. You’re here because you’re building a webhook feature in your app. Unfortunately, there are quite a few things that can go wrong from a security perspective. This article aims to ensure that you’re not making any well-known mistakes while building webhooks.

Challenges and Mapping Techniques in Attack Surface Discovery

At a time when the cloud estate of organizations is expanding faster than ever, the attack surface is becoming harder to monitor. This blog post aims to demystify attack surface discovery. We’ll explore what it involves, why it’s important, and how it fits into securing your digital assets. By the end, you’ll understand why a nuanced approach to attack surface discovery isn’t just beneficial; it’s essential for staying a step ahead against today’s sophisticated threats.

Security vs. Compliance: What's the Difference?

Security and compliance – a phrase often uttered in the same breath as if they are two sides of the same coin, two members of the same team, or two great tastes that go great together. As much as I would like to see auditors, developers, and security analysts living in harmony like a delicious Reese’s cup, a recent gap analysis that I was part of reminded me that too often, the peanut butter and chocolate sit alone on their own separate shelves.