Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Penetration testing is in the eye of the beholder

"Beauty is in the eye of the beholder." A famous phrase known to all indicates that our perceptions influence our definitions. The same can be said about penetration testing. Often when clients approach us for what they believe to be a penetration test, their definition and needs do not necessarily meet the accepted approach of those within the security field.

Refund Fraud-as-a-Service: What it means for eCommerce businesses

eCommerce is a trillion-dollar industry. But as the popularity of online shopping grows, so does the risk of refund fraud, which now costs businesses more than $25 billion every year. Refunds are a standard cost of retail — especially in eCommerce. But online shopping makes it much more difficult for businesses to investigate and verify valid refund demands from customers. Some customers take advantage of these difficulties by committing refund fraud.

Looking back at Black Hat USA 2022

For the past few days, I’ve been getting a lot of messages asking about my experience at this year’s Black Hat USA. So in this post, I’ll be recapping the conference to give you an inside look at what was presented and provide some helpful perspective. Black Hat is one of the largest — and most talked about — cybersecurity conferences. Its inception dates back to 1997.

Spear Phishing Triage Using ThreatQ and TDR Orchestrator

According to Proofpoint’s 2021 State of the Phish Report, more than 80% of organizations fell victim to a phishing attack last year. Another report from PhishMe found that 91% of cyberattacks start with a phish, and the top reasons people are duped by phishing emails are curiosity (13.7%), fear (13.4%), and urgency (13.2%), followed by reward/recognition, social, entertainment, and opportunity.

Why Dark Web Monitoring is Crucial to Protecting Your Business

The dark web is home to a ton of criminal activity—including a myriad of cybercrime services that can irreparably damage your company. You can find cybercriminals taking advantage of anonymity and operating illegal businesses such as selling personal information – compromised credentials, email addresses, credit card numbers, social security numbers and other kinds of personal data and financial information can all be bought and sold on the dark web.

GigaOm Radar Report Recognizes Keeper as a Leader in Password Management

Keeper Security is thrilled to announce it’s been recognized as a leader in Password Management by GigaOm, an analyst firm and media company specializing in strategic, engineering-led technology research, insight and analysis. The GigaOm Radar for Password Management places Keeper as a leader within the Platform Play and Innovation quadrant.

Government Agencies vs. Ransomware: A National Emergency

The State of Ransomware in Government 2021 report finds that government agencies are facing a ransomware “national emergency.” Local governments in particular face higher rates of encryption during cyber attacks due to constrained budgets and organizational pressure to divert funds away from cybersecurity, leaving gaps in their data protection.

What We Can Learn from the 'Prompt-bomb' Uber Hack

It was the worst-case scenario for Uber, the popular ride-sharing app, when the company suffered a major data breach in early September. While the extent of the damage, and the data potentially stolen, is still being uncovered, the attack — and the methods used to execute it — can be examined and used to teach other organizations what (and what not) to do.