Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Data Breach at French Healthcare Payment Processor Puts 20 Million Policyholders at Risk

A single account being phished caused millions of French healthcare policyholder records to be breached. I’ve said it before… it only takes one phish. And in the case of French payment processor, Malakoff Humanis, a single click enabled a cyber attack was the catalyst for a data breach that occurred earlier this month, according to their post on LinkedIn (press See Translation for a localized version of the post).

Nearly One in Three Cyber Attacks In 2023 Involved The Abuse of Valid Accounts

Thirty percent of all cyber incidents in 2023 involved abuse of valid credentials, according to IBM X-Force’s latest Threat Intelligence Index. This represents a seventy-one percent increase compared to 2022. “One of the top initial access vectors in 2023—jumping from third to first place— was the abuse of valid accounts identified in 30% of the observed incidents X-Force responded to,” the researchers write.

Face off: New Banking Trojan steals biometrics to access victims' bank accounts

Venturebeat had the scoop on a fresh Group-IB report. They discovered the first banking trojan that steals people’s faces. Unsuspecting users are tricked into giving up personal IDs and phone numbers and are prompted to perform face scans. These images are then swapped out with AI-generated deepfakes that can easily bypass security checkpoints.

What is Quishing?

Malicious actors are always coming up with new and innovative ways to steal your money and information. This means it’s all the more important to be aware of these new attacks as they appear and know how to spot and respond to them. In this article I’ll be bringing attention to a new attack that has become increasingly common in recent months. That attack is called ‘Quishing’, and it is a specific new variant of the much broader attack known phishing.

Critical Authentication Bypass Vulnerability in ScreenConnect (CVE-2024-1709)

ConnectWise urges organizations using an on-premises installation of the ScreenConnect remote monitoring and management software (formerly known as ConnectWise Control) to update servers to version 23.9.8 immediately due to a critical remote code execution vulnerability. The ScreenConnect remote desktop product is at risk due to a pair of vulnerabilities: CVE-2024-1709 and CVE-2024-1708.

Beat the Clock: Meet the 5/5/5 Detection and Response Benchmark With Sysdig and Tines

10 minutes to pain. When it comes to cloud security, 10 minutes or less is what bad actors need to execute an attack. Does it mean your business could be at risk if you fail to detect and respond to an attack in less than 10 minutes? Absolutely yes. With more and more sophisticated security attacks actively occurring nowadays, security teams need to hold themselves to a modernized benchmark.

Why Organizations Need Automated Password Rotation

Password rotation has become less necessary for personal accounts if they are protected with strong and unique passwords and MFA. Organizations do need to implement password rotation to protect privileged accounts; however, manually rotating passwords can lead to security risks such as compromised passwords. Organizations need automated password rotation to protect privileged accounts from becoming compromised by weak or compromised passwords.

All You Need to Know About Retrieval-Augmented Generation (RAG) - Why Your Organization Needs It

Imagine accessing a giant repository of knowledge, extracting the most relevant information in response to your specific needs, and then using that information to generate intelligent, factual responses - that's the power of Retrieval-Augmented Generation (RAG). This innovative technology is taking the world of Artificial Intelligence (AI) by storm, and for good reason. Let's delve into what RAG is, why it counts, and how it can transform your organization.

TPRM Strategies for India's Digital Personal Data Protection Act

India established a framework for protecting and processing personal data called the Digital Personal Data Protection Bill. After passing both houses of Parliament, this bill evolved into the Digital Personal Data Protection Act (DPDP) in 2023. This act creates a robust and comprehensive framework to protect sensitive information while supporting India's economic growth and digital transformation.

Harden Cipher Suites for Robust TLS/SSL Encryption

Cipher suites are a set of cryptographic algorithms utilized by the schannel SSP implementation of TLS/SSL protocols. These algorithms are employed to generate keys and encrypt data. Each cipher suite designates specific algorithms for the following functions: In TLS 1.2 and TLS 1.3, the NSA suggests using cryptographic settings that meet the standards in CNSSP 15, known as Commercial National Security Algorithms.