Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Honeypot Recon: Global Database Threat Landscape

In today's digital era, the importance of securing databases cannot be overstated. As more and more global businesses and organizations rely on DBMS systems to store tons of sensitive information, the risk of targeted attacks and data breaches continues to increase. Therefore, the importance of monitoring and uncovering new actors along with their - often unique - attack techniques and methods is crucial.

How to secure the cluster in an air gap environment with Calico Cloud

The concern about securing the clusters has grown exponentially and one of the ways to secure it is by isolating the cluster from the Internet to lower the risk of eventual attack. Enterprises that deal with confidential customer data and work with regulatory agencies, such as financial and insurance institutions, require air gap environments for their clusters to create highly secure environments.

How To Get Rid of Viruses From Your iPhone

Malware is a persistent problem. As the digital age switched from desktops to handheld devices, so did hackers and other cybercriminals. Expansive enterprise attacks and small-scale phishing attacks now have companies with the inclusion of mobile data mining and virus infections. Your iPhone is no exception.

US charges two men with Mt. Gox heist, the world's largest cryptocurrency hack

More than ten years after the hack of the now-defunct Mt. Gox cryptocurrency exchange, the US Department of Justice says it has identified and charged two men it alleges stole customers' funds and the exchange's private keys. Two Russians, 43-year-old Alexey Bilyuchenko, and Aleksandr Verner, 29, are charged with conspiring to launder 647,000 Bitcoins - in a cryptocurrency heist which would have been worth approximately half a billion dollars today.

ChatGPT and Data Privacy

In April 2023, German artist Boris Eldagsen won the open creative award for his photographic entry entitled, Pseudomnesia: The Electrician. But, the confusing part of the event for the judges and the audience was that he refused to receive the award. The reason was that the photograph was generated by an Artificial Intelligence (AI) tool.

KeePass CVE-2023-32784: Detection of Processes Memory Dump

During May, a new vulnerability CVE-2023-32784 was discovered that affected KeePass. KeePass is a popular open source password manager which runs on Windows, Mac, or Linux. The vulnerability allows the extraction of the master key in cleartext from the memory of the process that was running. The master key will allow an attacker to access all the stored credentials. We strongly recommend updating to KeePass 2.54 to fix the vulnerability.

Understanding the Anatomy of a Malicious Package Attack

To identify malicious packages and protect yourself against them, you need to know what to look for. Here’s a simple guide. In January 2022, users of the popular open-source libraries “faker” and “colors” suddenly found their applications started to malfunction and display nonsensical data because they had been infected by a malicious package.

Mastering Attack Surface Discovery: A Power Tool for Security Operations Pros

As security teams witness that their organization’s digital footprint keeps growing in size and complexity, the urgent need for attack surface discovery becomes clear. But what exactly does attack surface discovery entail, and why is it so crucial in today’s digital landscape? This blog post aims to demystify attack surface discovery and provide insights into its importance for security operations teams.

Cyber Threats and Opportunities: What Channel Partners Need to Know to Grow

The cybersecurity landscape is constantly evolving, and channel partners must stay ahead of the curve to successfully defend their customers and grow their businesses. The good news is, according to Canalys, the global cybersecurity market is expected to grow by 13% in 2023, providing channel partners with significant growth opportunities.

5 Tips For Selecting Your Source of Threat Intelligence Information

In today’s digital world, cybersecurity threats are on the rise, and businesses must stay vigilant to protect their sensitive data from cybercriminals. To combat these threats, companies often rely on cybersecurity information vendors to provide them with intelligence information. However, the quality of the intelligence information provided by these vendors has come under scrutiny, and there have been concerns about the accuracy and effectiveness of the information provided.