Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Is Apple's Passwords App Safe?

Apple’s new Passwords app is only as secure as your device since it can be accessed using your phone’s passcode. If you have an easy-to-guess passcode, such as one with four digits, consecutive numbers or personal details like your birthday, it places your passwords at a greater risk of being accessed by an unauthorized person. A standalone password manager, like Keeper does not permit vault login with a passcode.

Brain Cipher Ransomware: A Growing Threat and How to Defend Your Business

In the always-changing world of online threats, ransomware attacks are getting trickier because bad people are always finding new ways to scam people. There is a new bug called Brain Cipher that is very dangerous. Brain Cipher ransomware is very bad. It can cost a company a lot of money, hurt its reputation, and make things not work right. Brain Cipher ransomware is cutting edge and dangerous. It has hurt companies all over the world a great deal.

Top FAQs about CrowdStrike Falcon Next-Gen SIEM

CrowdStrike Falcon Next-Gen SIEM enhances security operations by integrating data, AI, workflow automation and threat intelligence into a single platform with a unified console and a lightweight endpoint agent. We continue to innovate in next-gen SIEM to power SOC operations, most recently with a series of product updates announced at Fal.Con 2024. But we’re not stopping there.

Key learnings from the 2024 State of Cloud Security study

We’ve just released the 2024 State of Cloud Security study, where we analyzed the security posture of thousands of organizations using AWS, Azure, and Google Cloud. In particular, we found that: In this post, we provide key recommendations based on these findings, and we explain how you can use Datadog Cloud Security Management (CSM) to improve your security posture.

Why Institutional Adoption of Digital Assets is Skyrocketing in Africa

Crypto adoption is remarkably high in Africa. According to the Chainalysis Crypto Adoption Report, several of the world’s leading countries for crypto adoption are African, with Nigeria taking the highest rank overall. This is largely due to social and economic drivers across the continent, with digital assets offering a variety of benefits for African investors – such as protection against inflation, affordable cross-border transactions, and overall stronger financial access and inclusion.

Hooked by the Call: A Deep Dive into The Tricks Used in Callback Phishing Emails

Previously, Trustwave SpiderLabs covered a massive fake order spam scheme that impersonated a tech support company and propagated via Google Groups. Since then, we have observed more spam campaigns using this hybrid form of cyberattack with varying tactics, techniques, and procedures (TTP). Between July and September, we witnessed a 140% increase in these spam campaigns. In this blog, we will showcase the different spam techniques used in these phishing emails.

GitHub Comments from Legitimate Repositories Exploited to Deliver Remcos RAT

One of the most interesting findings of our Netskope Threat Labs Report: Insurance 2024 was the discovery that GitHub is the most popular application in terms of malware downloads for this specific vertical, surpassing Microsoft OneDrive, which is usually the undisputed leader of this unwelcome chart.

LLM Guardrails: Secure and Accurate AI Deployment

Deploying large language models (LLMs) securely and accurately is crucial in today’s AI deployment landscape. As generative AI technologies evolve, ensuring their safe use is more important than ever. LLM guardrails are essential mechanisms designed to maintain the safety, accuracy, and ethical integrity of these models. They prevent issues like misinformation, bias, and unintended outputs.

Policy as code in Kubernetes: security with seccomp and network policies

The dynamic world of Kubernetes and cloud security is constantly evolving. As we explore this complicated ecosystem, it’s crucial to understand the role of policy as code (PaC) and its impact on operations and security teams. Emerging from the broader paradigm of infrastructure as code (IaC), PaC represents a significant shift in how we manage and secure cloud-native environments.