Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How to Stay Safe While Online Gaming

To stay safe while playing online video games, you should follow cyber hygiene best practices to protect your anonymity. Best practices include using strong passwords, using a VPN and keeping your software updated. Read our eleven recommendations for keeping sensitive information secure and protecting yourself while playing online games.

Forbes Media Publishes Industry's First List of America's Most Cybersecure Companies

In a climate where companies largely gain attention only when something negative happens, it’s time to celebrate and recognize the companies who are best in class when it comes to cybersecurity. That’s why we applaud Forbes’ decision to produce the industry’s first list of America’s Most Cybersecure Companies. These companies illuminate how cybersecurity is being taken seriously as a core business issue.

How to Make the Business Case for ISO 27001 Compliance

‍As a CIO at a mid-sized company, I faced a new challenge when vendors asked for more specifics about our information security and the protocols we have in place to safeguard our sensitive data. Naturally, those questions were directed toward the IT team (and were phrased in ISO 27001 terminology), which was initially challenging because we had limited knowledge of that particular standard.

Closing the cybersecurity skills gap: How MSPs can help your business stay secure

The constant evolution of technology has led to increasingly sophisticated and frequent cybersecurity threats. As a result, the need for skilled professionals who can effectively handle these threats has never been more pressing. Sadly, there is a shortage of such experts to meet the growing demand. The (ISC)² Cybersecurity Workforce Study revealed that the global cybersecurity workforce gap is 3.4 million people.

ChatGPT and Software Supply Chain Risks

While some of the obvious misuse of ChatGPT in the world of cyber security was not unexpected – asking the artificial intelligence to write harder-to-detect malware and easier-to-convince phishing emails – a new threat has emerged that can leverage the very nature of the large language model. Ultimately, ChatGPT is a learning machine, and bases its answers on information it sources from the Internet.

Subdomain Takeover: How to Protect Your Domain

A subdomain is a prefix added to a domain name to separate a section of your website. It’s a part of the Domain Name System (DNS) hierarchy and is a domain that is a part of another (main) domain. Subdomains are primarily used to manage extensive sections of a web application that require their own content hierarchy, such as online stores, blogs, job boards, or support platforms.

10 Major Retail Industry Cyber Attacks

To compete in an increasingly cutthroat marketplace, retailers spend vast sums in hopes of becoming household names. But brand recognition is a double-edged sword when it comes to cybersecurity. The bigger your name, the bigger the cyber target on your back (no pun intended for the number one breach on our list). Retailers face growing cybersecurity risks.

The Potential Surfacing of Cardpool's Gift Cards

Cyberint discovered in the ‘wild’ what could possibly be associated with the ‘Cardpool’ gift card breach, a file named ‘cardpool leak’. It was collected by our platform, Argos. ‘Cardpool’ was an online business where customers exchanged or sold their unwanted or partially used gift cards. It was shut down in early 2021, but it’s been discovered that in late April 2021, a Russian Threat Actor allegedly sold $38 million worth of gift cards there.

Three Steps to Prevent a Cybersecurity Breach from MOVEit Exploit

SecurityScorecard conducted an extensive investigation into the Zellis breach. This research revealed alarming insights about the scale and persistence of the attack. The data exfiltration was carried out in several steps: Netflow data from Zellis IP ranges indicated large outbound transfers over HTTPS, which pointed towards the presence of a web shell. Additionally, SecurityScorecard researchers detected exfiltration over SSH to known malicious IP addresses.