Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

TON Wallet: A Guide to Telegram's Crypto

The TON wallet has had quite a challenging journey, especially in dealing with regulators right from the start. Until recently, the Telegram wallet app project remained in the realm of a test version, having somewhat discredited itself in the eyes of investors a few years ago due to legal disputes with the SEC, which led to its folding. Today, those times are behind, and TON is fully operational. Its convenience is top-notch as it is seamlessly integrated into the popular messenger Telegram, allowing users to make payments and reap the benefits.

What is purple teaming and how can it strengthen your cyber security?

To defend against rapidly evolving cyber threats, businesses need to continually adapt and innovate. This means that red and blue teams must work together on an ongoing basis to maximise their individual and collective impact. Purple teaming allows them to achieve this more effectively, significantly advancing organisations’ security posture.

Trustwave MDR: The Pivot Point That Enhances Multiple Security Tools

Several years ago, Trustwave, already a leader in Managed Security Services (MSS), recognized the shift in market needs and fully pivoted to its future as a Managed Detection and Response (MDR) leader. Trustwave's leadership chose this course because it understood that a leading cybersecurity solution provider could no longer be effective without all the weapons MDR brings to the fight.

How To Safely Shop Online

You can shop online securely by shopping on reputable websites, using strong and unique passwords when creating online shopping accounts and watching out for phishing scams. The internet has allowed retailers to sell online and provide a convenient way to shop; however, online shopping also exposes people to potential cyber attacks that can put them at risk of losing their personal and financial information.

Stories from the SOC: Proactive steps to protect customers from misconfigured MFA

Multifactor authentication, or MFA, provides users with an added layer of security when logging into web applications. Surpassing its predecessor, two-factor authentication, in 2023, MFA is a standard option for another layer of security for online accounts. . In May 2022, the Cybersecurity & Infrastructure Security Agency (CISA) published security advisory AA22-074A describing how default configurations within MFA applications are considered a vulnerability.

5 Tips to Defend Against Access Brokers This Holiday Season

The holiday season brings a shift in how people and businesses operate: Some companies may partially shut down, leaving only a skeleton crew to manage their IT environments, while others head into their busiest time of year. This seasonal change in staffing and business operations, combined with the general holiday distraction, often creates risk and makes organizations more vulnerable to cybercrime.

Becoming FedRAMP and StateRAMP Authorized Part 4: Can Continuous Monitoring Actually Give You a Leg Up?

Validating the security of your organization’s sensitive information at a single point in time with an annual risk assessment can be helpful, but what about the other 364 days of the year? If you have a cloud application and hope to sell your services to federal agencies, point-in-time assessments won’t be enough.

BlackCat Ransomware's New SEC Reporting Tactic: Turn Regulations Against Victims

Man Bites Dog: In an unusual twist in cybercrime, the ransomware group BlackCat/ALPHV is manipulating the SEC's new 4-day rule on cyber incident reporting to increase pressure on their victims. This latest maneuver highlights a sophisticated understanding of regulatory impacts in ransomware strategies.