Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The Strategic Advantage of Hybrid DDoS Protection: Cost Efficiency and Enhanced Control

In the digital age, distributed denial of service (DDoS) attacks pose a significant threat to organizations, potentially leading to service disruptions and financial losses. To effectively combat these threats, businesses are increasingly adopting hybrid DDoS protection solutions. By integrating cloud traffic scrubbing, on-premises local protection, global DDoS-specific threat intelligence, and an orchestration platform, hybrid solutions offer a comprehensive defense strategy.

The Middle East's Rise in Economic Growth: A Prime Target for Cybersecurity Threats

Obrela’s Nick Loumakis, Regional Managing Director MENA, describes the complex cyber attack landscape across the Middle East As the Middle East undergoes rapid economic growth and digital transformation across key sectors like finance, energy, and government, the region faces a surge in cybersecurity threats. The integration of cloud services, IoT devices, and digital financial systems has increased vulnerabilities, making it a focal point for sophisticated cyberattacks.

Scaling the Distribution and Trading of Tokenized Assets on the Fireblocks Network

At our most recent Fireblocks Network Open House in London, we hosted a panel featuring Fireblocks CEO Michael Shaulov, Ownera CEO Ami Ben-David, and Archax Chief Revenue Officer, Nick Donovan. In the panel, we discussed our new partnership with Ownera, a provider of interoperability technology and transaction orchestration using routers; together, we’re enabling financial institutions to distribute, access and trade tokenized securities on the Fireblocks Network.

Critical Unauthenticated Remote Command Execution Vulnerability in Palo Alto Networks Firewalls Actively Exploited

On November 14, 2024, Palo Alto Networks (PAN) revealed that a critical unauthenticated remote command execution vulnerability is being actively exploited against internet-exposed firewall management interfaces. According to their security advisory, Prisma Access and Cloud NGFW are not impacted by this issue. A CVE has not yet been assigned to the vulnerability.

Emerging Accelerated Mobile Page (AMP) obfuscation technique used in over 7% of global phishing attacks, exploiting TikTok, Google, and Instagram

Egress’ Threat Intelligence Team has identified that over 7% of global phishing attacks now use an emerging obfuscation technique that employs Accelerated Mobile Page (AMP) links to mask malicious URLs. Often embedded in phishing emails that impersonate well-known brands, threat actors aim to undermine the 'hover' technique taught in most security awareness training programs.

Phishing Attacks Exploit Microsoft Visio Files and SharePoint

Threat actors are exploiting Microsoft Visio files and SharePoint to launch two-step phishing attacks, according to researchers at Perception Point. “Perception Point’s security researchers have observed a dramatic increase in two-step phishing attacks leveraging.vsdx files – a file extension rarely used in phishing campaigns until now,” the researchers explain.

ISO 27001 Compliance: Checklist for Successful Certification

Achieving ISO 27001 compliance and certification will open countless doors with governmental, industrial, and other business relationships. As an internationally-recognized and trusted security framework, it’s taken quite seriously. That means you have to put your all into achieving certification if you hope to pass the auditing process. At Ignyte, we can help.