Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Scalper Bot Targets Christmas 2024: Criminal Groups Cash in on Low-Value Items

In 2020, scalper bots made headlines by hoarding PlayStation 5 consoles. Lockdowns and online-only sales allowed bots to dominate the market, leaving frustrated consumers empty-handed. Today, scalper bots are even more dangerous. Criminal groups behind these operations have evolved. They are organized, professional, and focused on more sustainable targets: low-value items in massive quantities.

Top 14 GitHub Data Risks: Data Loss Scenarios and How to Prevent Them

While GitHub offers robust features, preventing data loss risks requires proactive measures. It’s vital as businesses increasingly rely on GitHub for source code management, safeguarding repositories against data loss, breaches, and operational disruptions. This overview explores the 15 most common data risks and provides actionable strategies for securing repositories and maintaining seamless development workflows. Contents hide 1 Risk 1. Accidental deletion of repositories 2 Risk 2.

Refresh yourself on 2024's top cyber attack trends to stay safe in 2025

We’re officially in the final days of 2024, a year so eventful it feels difficult to remember half of what happened. We had the Olympics in Paris, which turned the world into fans of sharpshooting, breakdancing, and the pommel horse; a solar eclipse visible in totality from the US for the first time since 1979; and a monthslong, very impassioned rap battle between Kendrick Lamar and Drake.

Zero Standing Privileges: Minimizing Attack Surfaces in Organizations

Restricting access to critical data and systems is the backbone of strong organizational cybersecurity. Zero standing privileges (ZSP) is an access management strategy that helps organizations limit access to resources as much as possible in order to minimize cybersecurity risks. In this article, we’ll explore the elements of a ZSP strategy, explain the risks related to standing privileges, and examine how to implement ZSP in your organization.

Detectify year in review 2024

In 2024, we shipped numerous features to help security teams manage their growing attack surface. Some examples are Domain Connectors for continuous discovery, a new Integrations platform for greater flexibility, and a Domains page for unprecedented control over attack surface data. Read on to explore our highlights of this year, check out the top vulnerabilities that made headlines, and discover what lies ahead in 2025.

23 NYCRR Part 500 Amendment Compliance Checklist

Banks and Insurance companies in New York are grappling with the complexities of 23 NYCRR Part 500, a challenging cybersecurity regulation that demands comprehensive and nuanced security measures. The primary hurdle for these organizations is translating the regulatory language into actionable, practical steps that meaningfully enhance their cybersecurity posture.

Did you make the *security* naughty or nice list this year?

As we approach the end of the year, many of us are reflecting on what we accomplished in 2024 — what did we do well this year? What could we have done better? It's also the perfect time to reflect on how to improve your team’s security practices. Have you been staying ahead of threats or have you let a few vulnerabilities slip through the cracks?

4 tips for securing GenAI-assisted development

Gartner predicts that generative AI (GenAI) will become a critical workforce partner for 90% of companies by next year. In application development specifically, we see developers turning to code assistants like Github Copilot and Google Gemini Code Assist to help them build software at an unprecedented speed. But while GenAI can power new levels of productivity and speed, it also introduces new threats and challenges for application security teams.

Understanding NIS2: Essential and Important Entities

NIS 2 aims to enhance the security of networks and information systems in the EU. Its main goal is to level up the cybersecurity game across Europe. It requires organisations in critical sectors to take cybersecurity seriously. The transposition of the NIS2 Directive into national law by member states emphasizes the deadline for compliance and the implications for cybersecurity regulations within each country’s legal framework.