Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Meeting your data security responsibilities with GDPR penetration testing

In this article, we outline how conducting regular GDPR pen tests can help to mitigate the risks of data breaches. Since it came into effect in 2018, the GDPR has helped to improve the way that organisations operating across the EU and UK collect, handle, process and store personal data. The GDPR covers all aspects of data protection, including the requirement for organisations that handle personal data to improve information security and governance.

SUNBURST Backdoor: What to look for in your logs now - Interview with an incident responder

Yesterday, FireEye published a report about a global intrusion campaign that utilized a backdoor planted in SolarWinds Orion. Attackers gained access to the download servers of Orion. They managed to infect signed installers downloaded by Orion users who had all reason to believe that the packages are safe and had not been tampered with. With this information out in the world, teams are scrambling to investigate if their environments are affected by this breach.

Do you need to protect your sensitive CAD files when collaborating with third-party vendors?

Cyberattacks are becoming a regular feature in the global market. The scale and variety of these attacks have grown considerably. The recent pandemic has spiked such attacks and many Covid-19 scams ranging from social media posts, smishing (small message phishing), phishing, ransomware, have skyrocketed this year.

How secured are touchless solutions?

Touchless solutions have risen to the forefront this year because of the latest pandemic that has reshaped the way we work and live. When social distance policies were placed in motion, borders closed, establishments paused operations, and businesses moved online operating amid lockdown. Touchless technologies had to be put in place almost everywhere to preserve human touch. It has ceased to be just an option since it is now a necessity in the new normal.

Detectify security updates for December 14

Our Crowdsource ethical hacker community has been busy sending us security updates, including 0-day research. For Asset Monitoring, we now push out tests more frequently at record speed within 25 minutes from hacker to scanner. Due to confidentially agreements, we cannot publicize all security update releases here but they are immediately added to our scanner and available to all users. The following are some of the security vulnerabilities reported by Detectify Crowdsource ethical hackers.

LogSentinel's 2020 Year in Review

The events of 2020 brought us unprecedented challenges that no one was prepared for, changing the way we live, work, and communicate, impacting the global economy, all geographic regions, and every single industry. In such a downturn cybercrime flourishes, especially when organizations move most of their operations and processes online.

Round up 2020: Regulatory changes in Digital Verification industry

We have witnessed major shifts in identity and verification industry as, post March 2020 a sudden explosion of people going digital was observed. It opened gates for vulnerability and opportunity for fraudsters. In April 2020, with a surge in work from home scenario- accelerated the process of administering remote systems and adequately protect them.