Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

TikTok Trackers Can Still Be Present Regardless of TikTok App Installation

In an analysis of over 3,000 websites and over 100,000 associated webpages (using the client-side security scanning feature of Feroot Inspector) across 6 sectors, it was discovered that TikTok pixels/trackers were present on 7.41% of the analyzed websites (shown in Table 1). Here, TikTok pixels/trackers were within the code of the web pages that load into a user’s browser from those websites.

Independent of their Apps, bad actors banned by various executive orders have pixels/trackers on everyday websites

“ manipulate content, and if they want to, to use it for influence operations” – FBI Director Chris Wray “To maintain the security of data owned by the state of Nebraska, and to safeguard against the intrusive cyber activities of China’s communist government, we’ve made the decision to ban TikTok on state devices.” – NB Governor Pete Ricketts “Protecting citizens’ data is our top priority, and our IT professionals have determined, in consultat

What is a trust management platform?

When you start pursuing compliance for a particular security standard, you do it with a specific goal in mind. Maybe you’re pursuing compliance because it’s a legal requirement in your industry or because a prospective customer requires it. ‍ But what happens after you achieve that initial SOC 2 or ISO 27001? It’s easy to get caught up in checking the boxes and lose sight of the why behind your security and compliance work. ‍

What is a Cyberattack?

A cyberattack is an attack on computers, networks or systems by cybercriminals in an attempt to steal or access sensitive information. The information stolen during an attack can also open the door to other types of cyberattacks such as social engineering scams. Continue reading to learn more about cyberattacks and what you can do to protect yourself against them, both in your personal life and at your workplace.

Lookout Discovers Android Spyware Tied to Iranian Police Targeting Minorities: BouldSpy

Researchers at the Lookout Threat Lab have discovered a new Android surveillance tool which we attribute with moderate confidence to the Law Enforcement Command of the Islamic Republic of Iran (FARAJA). Named BouldSpy for the “BoulderApplication” class which configures the tool’s command and control (C2), we have been tracking the spyware since March 2020.

What's the difference: Vulnerability scanning vs Penetration testing

Vulnerability scanning and penetration testing should be an essential part of your cybersecurity strategy. This blog discusses the above methods in the context of securing your web applications, including the benefits, drawbacks, and compliance implications. Table of contents: What is a vulnerability scan? What is a penetration test? What are the drawbacks of the traditional pen test model? Should I only to pen tests, vulnerability scans, or both?

Is it possible to manage a Web3 business without touching crypto?

Operating a Web3 business typically requires the use of crypto in either development, operations, or finance. However, some new entrants into the Web3 space may not want to deal with the accounting, regulatory, or custody issues associated with crypto – or with its volatility. So, how can Web3 businesses efficiently operate while minimizing their exposure to crypto?

Create a seamless Web3 onboarding experience for Web2 users

Web2 users are accustomed to an easy sign-up and onboarding process for almost any application or service they engage with. In most cases, they simply use their email or phone number to create a username and password. However, when engaging with Web3 applications, users will need to either connect an existing wallet to the application or create a new wallet.

What can Web3 offer retail, luxury goods, and sports brands?

Web3 is top-of-mind for many marketing and customer experience team in 2023. Multiple high profile companies such as Nike,Tiffany, Spotify, Gucci, have already launched Web3 initiatives. Web3 has unique characteristics that offer brands and sports organizations a new way to engage with customers, users, and fans through loyalty programs. At the same time, it helps organizations cater to different demographics and directly monetize these efforts.