Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Thousands of American and Southwest Airlines Pilots Exposed by Third-Party Breach

American Airlines and Southwest Airlines are both known for offering a long list of destinations throughout the United States and some other parts of the world. Two of America's largest airlines just suffered from a data breach that threatens to expose new pilots and cadets joining and hoping to join the airlines.

TrustCloud Product Updates: June 2023

Coming soon TrustCloud’s New Platform Experience Get ready for a new and improved homepage that gives you a high-level snapshot of your compliance program, risks, employee compliance, automation status, and audit preparedness—all without toggling between apps. See a sneak peek. Coming soon Ask questions, get answers in TrustCloud Forums We created FlightSchool to help you learn about our products, GRC, and trust. Now, you can join the conversation with FlightSchool Forums!

Android Malware Outbreak: Unmasking the RAT Inside a Screen Recording App

With the worldwide popularity of Android and its open-source software, hackers have an increased incentive and opportunity to orchestrate attacks. A Google search for “Android malware” brings up headlines like these, all from the past few days or weeks: SecurityScorecard recently analyzed a specific threat known as the AhMyth RAT (remote access trojan), which made headlines for infiltrating a popular screen recording app on the Google Play Store.

Securing Privileged Access in a Remote Work World: Challenges and Best Practices

In today's disconnected world, the task of managing privileged access has become increasingly challenging. The surge in remote work has exposed employees to new vulnerabilities as they access sensitive systems and data from unsecured networks and personal devices, making them attractive targets for cyberattacks. To combat these risks, organizations must adopt Privileged Access Management (PAM) solutions.

Building a security-conscious CI/CD pipeline

Continuous integration (CI) and continuous delivery (CD) has become a ubiquitous practice for DevOps teams. The CI/CD process focuses on building and deploying new applications or releasing updates to already-deployed workloads. As a result, most CI/CD efforts focus on enhancing development speeds. However, CI/CD practices can accomplish much more than enabling workload deployments.

The importance of verifying webhook signatures

Webhooks are a callback integration technique for sending and receiving information, such as event notifications, in close to real-time. Webhooks can be triggered by application events and transmit data over HTTP to another application or third-party API. You can configure a webhook URL and connect external participants to customize, extend, or modify workflows. Webhooks may or may not be signed.

Announcing the Open-Source Reliability Leaderboard: A New Resource for Preventive AppSec

We are excited to announce the inaugural edition of the Mend.io Open-Source Reliability Leaderboard! Powered by data from Renovate, the wildly popular open-source dependency management tool, the Leaderboard presents the top packages in terms of reliability across three of the most widely used languages.

GitProtect v. 1.5.1 Features Forever Incremental, SLA Reports, Archiving User Logs

We present to you the new version of GitProtect – 1.5.1, and along with it… the long-awaited backup plan scheme – Forever Incremental! Amongst the novelties, you can also notice the SLA Reports for improved security control, log archiving, and several other enhancements aiming to speed up the app’s operation.

Understanding Proxies: The Four Principal Use Cases

The function of a proxy can be likened to that of a mediator between a device and the internet at large. By substituting your IP address with its own, a proxy intercepts and manages all of your traffic. Using a separate IP address can be advantageous for several reasons. For instance, proxy servers afford the user more governance over their internet access, offering control over the amount of data that websites and services can acquire about you.

Residential vs. Datacenter Proxy: A Comprehensive Comparison

Proxies play a transformative role in expanding the possibilities of internet usage. While both datacenter and residential proxies offer the benefit of hiding your real IP address and ensuring online privacy, they also have additional features that set them apart. In this article, we will delve into the details of these proxies, highlighting their differences and helping you make an informed choice.