Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Get the AT&T Cybersecurity Insights Report: Focus on Healthcare

We’re pleased to announce the availability of the 2023 AT&T Cybersecurity Insights™ Report: Focus on Healthcare. It looks at the edge ecosystem, surveying healthcare IT leaders from around the world, and provides benchmarks for assessing your edge computing plans. This is the 12th edition of our vendor-neutral and forward-looking report.

Keep Identity Real with MFA and Strong Credentials

Would you bet your business on the strength of every employee’s password? If you haven’t deployed business-grade MFA and credentials management throughout your organization, you are probably on the losing end of that bet. Here’s why: Despite the challenges, passwords are not going anywhere any time soon.

Threads : Security Issues You Should Be Aware Of Before Using

Meta’s new app called Threads was launched on the 6th of July 2023 by Mark Zuckerberg. The app is an extension of the Instagram app and everybody is excited to talk about it as it is compared with Twitter. However, the app gained 30 million downloads in its first 16 hours. Currently, the app is available for 100 countries including the United States, Australia, Canada, India and Japan.

ARMO named in Gartner Cool Vendors report

Gartner expert analysts use the following guidelines and approach to identify and research Cool Vendors. A vendor must be considered innovative, impactful, or intriguing in either the products or the IT services sectors. Cool Vendors are not limited to technology coolness. However — coolness may also include services or unique business models.

Top 9 Integration Testing Tools in 2023

Integration is an indispensable aspect of modern software development. As software applications become more complex and interconnected, every component must work seamlessly together like a game of Tetris. This is where integration testing comes into play, allowing developers to test whether different parts of an application play nicely together. This article will discuss what integration testing tools are, the types, benefits, and key features to look for when choosing one.

Nubank integrates Fireblocks to expand blockchain-based product offerings

Today, Brazilian-based Nubank, announced they are integrating Fireblocks into Nubank Cripto, the company’s in-app solution for buying and selling cryptocurrencies. With over 80 million customers across Brazil, Mexico, and Colombia, the world’s largest neobank leverages proprietary technologies to empower individuals and SMEs to foster financial access across Latin America.

Three Key Takeaways From the Newly Adopted EU-US Data Privacy Framework You Need To Know

On July 10th, the EU Commission adopted an adequacy decision for the proposed EU-U.S. Data Privacy Framework. This is exciting news for organizations, as many have been stuck in privacy "limbo" since the annulment of the previous EU-U.S. Data transfer mechanism, Privacy Shield, which was annulled due to challenges in court by privacy activist Max Schrems.

Launch Of New Meta Thread App Spawns Hundreds Of Spoof Domains

Researchers at Veriti have observed hundreds of spoofed domains following Meta’s launch of its Threads social media platform. “In recent weeks, we have observed a surge in the creation of suspicious domains, with over 700 domains related to Threads being registered daily,” the researchers write.

Phishing Attacks Employing QR Codes Are Capturing User Credentials

Using a new twist to bypass detection from security solutions, cyber attacks are now employing what will be construed as a benign image whose malicious intent can’t be traced. Threat actors need some means of getting a user to engage with malicious content – whether an attachment, link, or phone call, there needs to be some content within an email that provides the victim user with their next step.

Two-Thirds of Ransomware Attacks Against Manufacturing Resulted in Encrypted Data

As the rate of ransomware attacks steadily increased over time, there are clear indicators as to how these attacks are starting and, therefore, what can be done to stop them. With the exception of the Verizon Data Breach Investigations Report, we rarely get insight into specific industry verticals.