Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Ultimate Security Checklist to Launch a Mobile App in the United States - iOS & Android

Over 4 million mobile apps (Android and iOS combined) are available to download. A majority of those apps store and process confidential user information such as contact number, email, age, gender, banking details, etc. No wonder mobile apps are one of the most lucrative and sought-after targets for hackers, and app fraud volumes are expected to double by 2026.

GitGuardian vs. Custom-Built Secrets Detection Tools

DIY or open-source secrets detection can seem cost-effective and customizable initially... until you start hitting the first obstacles like scalability, developer experience (DX), or deep application security expertise. Read on to find out how GitGuardian can help you rise above these!

Reset Password via Set-ADAccountPassword Poweshell Cmdlet

Users normally update their domain account passwords using the Windows Settings menu. But if they forget their password or their account is disabled, an administrator needs to step in. This blog post explores several ways that an admin can reset a user’s password or create a new one. First, we review the easiest options: Active Directory Users and Computers (ADUC) and Active Directory Administrative Center (ADAC).

Best Practice Tips for Better SharePoint Site Security

Microsoft SharePoint is one of the most popular platforms for collaboration and content sharing within internal teams and even with external users. Therefore, ensuring SharePoint security is vital to helping your company avoid costly data breaches and business disruptions. This article details the key best practices for protecting your SharePoint sites, whether you are using on-prem SharePoint Server or SharePoint Online version.

CVE-2023-27532: PoC Exploit Released for Veeam Backup and Replication Vulnerability

On Saturday, March 18, 2023, Horizon3 researchers released a proof-of-concept (PoC) exploit for CVE-2023-27532, a high-severity missing authentication vulnerability impacting Veeam Backup and Replication (VBR) software. Based on Horizon3’s technical analysis published on March 23rd, the PoC exploit allows a remote unauthenticated threat actor with access to the VBR service to obtain plaintext usernames and passwords.

Different Types of Hackers: The Good, the Bad, and the Other

Hacking and hackers are terms that have become increasingly prevalent in our modern world. They are also often associated with negative connotations. By definition, hacking is using computer programming and technical skills to gain unauthorized access to computer systems, networks, or digital devices. Meanwhile, a hacker is someone who engages in these activities.

Independent Living Systems LLC Gets Hacked, Exposing 4 Million Patients

Independent Living Systems LLC is a healthcare facility provider for the elderly, physically challenged, and impaired. The company establishes short-term healthcare facilities for those that need extra care. If you or a loved one has utilized short-term living care at a facility, you may have relied on services from Independent Living Systems. Unfortunately, this healthcare provider recently suffered a massive cyber-attack.

Weekly Cybersecurity Recap March 24

Cyber-attacks are a major problem that exposes millions of people to fraud on an annual basis. This week there were attacks on some truly massive organizations like the NBA and PayPal, as well as a cyber security company and a few medical companies. The attacks put millions of people at risk, and they could lead to huge financial losses. Find out all the details about these attacks below and learn if you were put at risk by any of them.

How Can AI Predict Cybersecurity Incidents?

As technology becomes more prevalent in our lives, the risk of cybersecurity incidents is also increasing. Cybersecurity incidents can cause significant damage to organizations, including financial loss, reputational damage, and theft of sensitive data. Therefore, it is essential to have a robust cybersecurity system in place to protect against cyber-attacks. Artificial intelligence (AI) is one technology that can be used to predict cybersecurity incidents and mitigate their associated risks.