Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Grazie Ragazzi-But it's not Ferrari who's saying it this time!

Ferrari’s woes seem to be continuing from F1 tracks to their data. And surprisingly, ransomware today encrypts files as fast as a Ferrari V8 goes from 0 to 60 mph. The current ransomware attack means cybercriminals now have access to confidential client data. Remarkably, this isn’t the first time Ferrari has been the victim of a ransomware attack; in October of last year, critical documents belonging to the brand were leaked online.

Five worthy reads: The digital dark age-Exploring the flip side of a data-driven world

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, to mark the upcoming World Backup Day, we explore the concepts of data decay and the digital dark age. Data is often equated with oil and gold because of how valuable it can be. On the personal front, it comprises anything from digital copies of official documentation to precious memories.

Keeper - The Only Enterprise Password Manager to Use Elliptic Curve Cryptography

Keeper’s Enterprise Password Manager is the only solution that uses Elliptic Curve Cryptography (ECC) in its encryption, making it the most secure password management solution available. ECC is a public-key cryptography method based on the mathematics of elliptic curves. First proposed in 1985, it recently rose to prominence with modern cryptography as it provides a higher level of security compared to traditional encryption methods, such as RSA.

5 cyber threats that criminals can generate with the help of ChatGPT

ChatGPT, the public generative AI that came out in late November 2022, has raised legitimate concerns about its potential to amplify the severity and complexity of cyberthreats. In fact, as soon as OpenAI announced its release many security experts predicted that it would only be a matter of time before attackers started using this AI chatbot to craft malware or even augment phishing attacks.

The Ultimate Guide to SaaS User Onboarding

User onboarding, in particular for SaaS organisations, may raise the bar for your product. More sales may result straight from onboarding. So, encouraging new users to stay is essential. Additionally, the best way to build a community around your SaaS offering is through satisfied customers. These two factors are the precise reasons why the initial few client contacts must be successful.

My Username Fields Have Passwords in Them! What Do I Do?

As security practitioners, we like to read blogs, whitepapers, and even Mastodon “toots” that talk about new or novel threats and vulnerabilities. Recently, our fearless and never sleeping Security Strategist Leader James Brodsky called attention to a blog post from a researcher that highlighted the risks of password disclosure in authentication logs.

Must Know Software Development Best Practices For Every Developer

Software is an integral part of everyone’s life and it gets used for both personal and professional tasks. But, if any complexity occurs in it, overall business operations can get impacted. And as a developer/programmer or a part of the development team, you must make sure that application will function seamlessly. And to assure it, you must prefer following the software development best practices.

What is DigiCert EV Code Signing Certificate? How Does EV Code Signing Works?

Among the numerous certificate authorities, DigiCert is a prominent name, whose solutions are always up-to-the-mark. And DigiCert EV Code Signing Certificate is one of the most advanced software security solutions. From protecting an application from malicious actors to removing warnings and enhancing brand value, it provides some amazing benefits. If you are a developer, a software publishing organization, or a technology enthusiast, then you must know about it.