Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Pirates of the Inbox: Navigating the Dangerous World of Business Email Compromise

Business Email Compromise (BEC) is one of the fastest-growing and financially-damaging cybercrimes. It has consistently led the way in cybercrime losses in recent years. According to the 2022 FBI Internet Crime Report, the FBI received 21,832 Business Email Compromise (BEC) complaints, with estimated losses totalling more than $2.7B. Data shows a 38% increase in cybercrime as a service targeting business email between 2019 and 2022.

Forward Networks Receives Back-to-Back Honors in Security and Cloud Computing

Forward Networks was recently honored as the Top InfoSec Innovator by Cyber Defense Magazine. Commenting on the win, Yan Ross, editor of Cyber Defense Magazine said, “We scoured the globe looking for cybersecurity innovators that could make a huge difference and potentially help turn the tide against the exponential growth in cyber-crime. Forward Networks is worthy of being named a winner in these coveted awards and consideration for deployment in your environment.”

Unicis.Tech Unlocks Security with BoxyHQ: A Conversation with the Founder

At Unicis, their vision is to create a world where compliance is effortless, efficient, and transparent for every business. We strive to achieve this by providing a single, comprehensive application that addresses all compliance, privacy, risk and security concerns. Q: Thank you, Predrag, for joining us today to discuss your experience with implementing Enterprise Single Sign-On (SSO) and Audit Logs at Unicis.Tech. Let's start with your motivation behind implementing these solutions.

Application Risk Assessments: Why They're Important and How to Perform Them

An application risk assessment is the process of evaluating and understanding the security risks associated with an application. This information is used to help organizations make better decisions about how to protect their applications from potential attacks. By examining factors such as the number of vulnerabilities and the time needed to patch them, they are able to estimate the possibility of an attack on their application.

Build organizational resiliency with Microsoft's Chief Security Advisor

Major incidents like cyber attacks, terrorism, and pandemics are likely in the making right now but it doesn’t mean they’re inevitable. Learning from past incidents, asking the hard ‘what ifs’, and helping businesses build organizational resilience is always top of mind for security leader Sarah Armstrong-Smith.

Quantum Computing: A Revolutionary Leap in Technology and Privacy

Quantum computing might sound alien and strange - but it’s a revolutionary new technology. It’s a novel way to calculate using the principles of fundamental physics and to find solutions to very complicated problems very quickly. We have come a long way since the abacus; now, almost all of our complex calculations are done with digital computers. Looking to the future, quantum computers are ready to take us to another dimension of computing.

Unveiling Java Library Vulnerabilities

During a recent customer engagement, we encountered an interesting situation. The customer had raised concerns about a Java XXE (XML External Entity) vulnerability that had left their developers puzzled. Notably, their Static Application Security Testing (SAST) scans consistently identified this as a potential vulnerability.

Protect yourself against digital draculas this Halloween: Avoid AI-driven cyber trickery

As Cybersecurity Awareness Month winds down and you prepare for Halloween festivities like trick-or-treating and pumpkin carving, don't forget to protect against real-world monsters: artificial intelligence-driven cyber threats. Here are a few steps that may help ward off such threats like garlic protects against Dracula: Taking precautionary steps against them may keep the real monsters at bay!

Birds of a Feather: Collaboration and Sharing within the Exclusive ThreatQ Community

Over the past decade, ThreatQuotient has dedicated itself to the task of transforming obscure digital threat data into actionable intelligence. Throughout this period, we’ve earned the trust of our partners and customers, forging strong relationships with each of them. Each team we’ve encountered in the field has brought unique insights, skill sets, perspectives, and ideas, significantly influencing our approach and perception of the ever-evolving threat landscape.

October Release Rollup: Egnyte Document Room, E2E Connector, Co-editable Links for Google Files and more

This month's release rollup includes product updates and enhancements from Egnyte such as the introduction of the Egnyte Document Room, E2E Connector, and Co-editable links for Google files. Below is a summary of these and other new releases. Visit the linked articles for more details. ‍ Featured Platform Enhancements and Releases Egnyte Document Room: The Egnyte Document Room is a secure hub for sharing sensitive information.