Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Artificial intelligence might be insulting your intelligence

It’s Saturday morning. You’ve decided to sleep in after last night’s bender, and you can’t be bothered about the sound of your phone ringing. You decide to brush it off and go back to sleep, but the phone won’t stop ringing. You wake up and scan your surroundings. Your wife’s missing. You let the phone ring until it’s silent and bury your head in your pillow to block out the splitting headache that’s slowly building up. A single message tone goes off.

Ultimate Security Checklist to Launch a Mobile App in South America - iOS & Android

With mobile phones accounting for over 60% of website traffic in 2022, launching a mobile app in South America will be an astute decision. The future lies with smartphones and tablets, making it essential to move beyond traditional desktop solutions. But, did you know- In the first half of 2022, 10,666 ransomware signatures were found in Latin America, as against 5,400 in the last half of 2021.

KrakenLabs' Threat Actors Naming Convention

KrakenLabs has developed a new naming convention that uses poisonous plants to represent the origin and criminal activities of threat actors. This approach provides a creative way to classify different types of threat actors, allowing security professionals to quickly understand the nature and behavior of the threat actor, which is helpful for identifying and mitigating threats effectively.

5 Tips for Functional Testing in Java

Functional testing is a critical aspect of application development, and it plays an essential role in products being built within the Java ecosystem to ensure they meet their functional requirements and work as intended for the end user. As this method of testing is heavily based on validating “functionality” (i.e., “Does this application work the way we intend it to work?”), it is essential to utilize it throughout the development process.

What is Token Signing Certificate and How Does it Works?

The most crucial component of any federated partnership is the token-signing certificates, which serve as a key validation method to guard against malicious tampering and security token fraud. These certificates employ a private/public key pairing to authenticate that a legitimate partner federation server issued a security token and confirm that the token was not altered in transit, these certificates employ a private/public key pairing.

What is FIPS? Detailed Guide on FIPS 140-2

The Federal Information Processing Standard (FIPS) is a collection of rules published by the National Institute of Standards and Technology (NIST) that outlines how to store and handle sensitive data securely. It is a fundamental security precaution that all companies must use to protect Personally Identifiable Information (PII). FIPS defines best practices for data encryption, authentication, and access control.

10 Insider tips to set up Azure Security Groups

If you use the Azure cloud, Azure security groups should be on your radar because they’re a fundamental component of securing your resources. As we move into 2023, 63% of SMB workloads are hosted in the cloud, and cyber threats continue to increase, with 45% of breaches reportedly being cloud-based. The good news is Azure security groups act as virtual firewalls, allowing you to define and control access to your network resources, such as virtual machines, subnets, and applications.