Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Five tips to avoid spear phishing attacks

Cybercriminals make use of sophisticated tactics to craft convincing spear phishing attacks, and consequently, organizations need a solid understanding of the evolving cyber threat landscape to combat them. Spear phishing is a form of phishing where cybercriminals use highly targeted emails to deceive individuals into revealing sensitive data or transferring funds. 65% of all known hacking groups use spear phishing, making it the most popular form of attack.

Top tips: 8 ways to secure your mobile phones from cyberthreats

Mobile phones have become an indispensable tool in all our lives. Ensuring their security and protecting sensitive information becomes paramount, especially when you have all your work-related apps and data synced. Every 39 seconds, a new assault occurs on the internet, and 24,000 malicious mobile apps are typically blocked everyday.

Featured Post

Exploiting ancient vulnerabilities: How did the 3CX supply chain attack occur and what can we learn from it?

On March 29th, North-Korean linked threat-actors targeted 3CX, a VoIP IPX developer, exploiting a 10-year-old vulnerability (CVE-2013-3900) that made executables appear to be legitimately signed by Microsoft when, in fact, they were being used to distribute malware. The 3CX attack is just the latest in a series of high-profile supply chain attacks over the past year. The SolarWinds attack compromised the Orion system, affecting thousands of organizations, and the Kaseya VSA attack that was used to deliver REvil ransomware also to thousands of organizations and is considered one of the largest security breaches of the 21st century.

Venom Control-RAT With a Sting

As the cybercrime industry continues to provide us with new Malware as a Service (MaaS) products, we have become used to seeing the operators advertising and developing the panels underground. Over the past year, an allegedly legitimate software company named Venom Control Software emerged, offering a Remote-Access-Tool (RAT) for “hackers and pen-testers”.

How to Use the MITRE Framework to Protect Your Organization

In a recent poll we conducted, two thirds of respondents shared they were unaware of the MITRE ATT&CK Framework or were only beginning to understand what it can provide. When used correctly, MITRE ATT&CK can significantly help organizations bolster their security posture. In this blog post, we explain how security teams can leverage MITRE ATT&CK and how Cato Networks’ SASE can help.

Take it From a Compliance Officer: Secure Networks Matter

Even before the fiasco at Silicon Valley Bank, financial institutions were under tremendous scrutiny from regulators. How could they not be? Banks are among the oldest known targets for theft, and in a digital age, the best way to extract money is going to be either straight cyber-theft from existing accounts or ransomware. IT systems that house customers’ financial data can be architected with the right security controls in place to protect that data to the highest standard.

Trustwave MailMarshal's Blended Threat Module Offers Maximum Protection Against Phishing

Trustwave MailMarshal is a highly dependable and adaptable email security solution that has established itself as a leader in the industry, earning recognition over many years. With the inclusion of Trustwave MailMarshal's Blended Threat Module (BTM), it now offers enhanced protection against phishing attacks, utilizing the power of machine learning for security measures.