Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Weekly Cybersecurity Recap September 15

This week, data breaches were particularly bad, with attacks impacting travel technology giant Sabre, production giant Johnson and Johnson, and medical company Amerita. The online service marketplace called Freecycle was also impacted and so was Traderie, a game trading platform. Millions of individuals lost their information between these various breaches. Get more details about each of the specific attacks below.

Travel Technology Company Sabre Suffers a Vast Data Breach

Sabre is a huge technology company that serves as a powerful travel reservation system for many of the major hotels and airlines in the United States. The company handles huge volumes of data during its daily duties and is responsible for maintaining accurate booking data for all these different travel companies. Sabre was recently the victim of a data breach, putting all that data at risk potentially.

Can You Get Hacked Just By Opening an Email?

No, you cannot get hacked just by opening an email. The only way you can get hacked through an email is by interacting with the contents of the email, such as clicking on a malicious link or attachment. Continue reading to learn more about malicious emails and how to avoid getting hacked through them.

Revolutionizing continuous governance

In an era where data security and access management are crucial, organizations are constantly on the lookout for modern ways to enhance their governance strategies. What if you could not only manage user identities and access rights but also extend this governance to protect privileged access, applications, cloud infrastructure and data? What if there was a comprehensive identity governance framework that could integrate and manage all your systems seamlessly?

Invest in PAM to reduce your Cyber Insurance premiums

Cyber insurance has become a key component of risk management for many organizations. However, it can be difficult to keep up with cyber insurance requirements and avoid high premiums. One of the best ways to secure better cyber insurance coverage and premiums is by implementing a solid Privileged Access Management (PAM) solution.

Latest Cyber Threat: Quishing or QR Code Phishing Method

As technology continues to advance, businesses are utilizing various methods to streamline their operations and enhance their online presence. One of the approaches that have gained popularity over the years is the use of Quick Response (QR) codes. These codes make it easy for customers and employees to access information quickly and conveniently. However, cybercriminals.

Navigating the Open Source Landscape: Finding Your First Contribution

🕵️‍♂️ Embarking on your journey and learning how to contribute to open source is an exciting step towards honing your programming skills, collaborating with experts, and giving back to the global developer community. However, the challenge often lies in finding the right project to kickstart your open-source journey.

Weaponizing the Utility of Jenkins Script Consoles

Jenkins misconfigurations can have far-reaching consequences; Cisco Panoptica’s attack surface scanner can detect such misconfigurations. Jenkins is a widely used tool for continuous integration and continuous delivery and deployment (CI/CD). It allows enterprise developers to automate application delivery easily, either through an enterprise-hosted or a third-party hosted Jenkins service.

Microsoft GDAP (granular delegated admin privileges)

If you have a CSP, MSSP, reseller or any other 3rd party that has access to your environment(s) and GDAP isn’t implemented, it’s likely they have the Global Administrator role by default. If your provider hasn’t contacted you about GDAP and/or implemented it already, you’d be right to question what else they haven’t done for you!?

Staying ahead of LockBit ransomware attacks

LockBit is a Ransomware as a Service (RaaS) provider accountable for most LockBit ransomware attacks in 2023. The LockBit RaaS group came into existence in 2019 and has posed great challenges to security experts ever since. A recent report states that LockBit accounted for over one-third of all ransomware attacks in the latter half of 2022 and the initial quarter of 2023.