Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How to Extend Your Digital Transformation Efforts to Your GRC Program

Digital transformation is no longer a new concept – various business functions have already embraced cutting-edge technology to stay ahead of the curve. From IT, sales, and marketing to customer support and even finance, it is evident that most departments understand how integral the transformation is to gain a competitive advantage and continue to win customers. However, when it comes to Governance, Risk management, and Compliance (GRC), most are still stuck with archaic, ad-hoc processes.

Shift-Left Testing and Its Benefits

Testing practices have been shifting left in the software development process due to the growing challenge of developing and delivering high-quality, secure software at today’s competitive pace. Agile methodologies and the DevOps approach were created to address these needs. In this post, we’ll map out the basics of shift-left practices in the DevOps pipeline and discuss how to shift left your open source security and compliance testing. Contents hide 1 What does shift left mean?

Operational Technology Security Needs an Urgent Upgrade

Operational Technology (OT) security has been thrown into the spotlight in the wake of several recent high-profile supply chain attacks targeting critical infrastructure. Security incidents such as the Colonial Pipeline attack have re-established the critical significance of Operational Technology Security, especially for the global power and energy sector.

Why Online Passport Verification is practical for secure Digital Onboarding

There have been several reports of counterfeit passports. But what does a document verification for passport reveal? A passport is regarded as one of the most reliable sources of personal information. Passport verification checks the candidate’s personal information on the passport verification documents. It does not validate fraudulent passport issues, but just tampering with personal information to verify passport number and the passport MRZ code.

How to prevent a rootkit attack before it is too late?

A rootkit is a malicious software program that helps cybercriminals infiltrate a system and take control. Hackers use rootkits to carry out espionage, data theft, deploy other malware such as ransomware, and all without leaving a trace. Once a rootkit is installed on a device, it can intercept system calls, replace software and processes and be part of a larger exploit kit containing other modules such as keyloggers, data theft malware, or even cryptocurrency mining malware.

What's New in OT Visibility?

As the industrial sectors become more cyber-aware, OT visibility has become an important force towards protecting critical infrastructure. Yet, as OT Security progresses, the expansion of Industrial Internet of Things (IIoT) adds new challenges to maintaining pace with OT visibility. What once was a Whack-a-Mole game between security and its adversaries, now seems to be the same game between security and IIoT hyper-connectivity.

Lookout Discovers Hundreds of Predatory Loan Apps on Google Play and Apple App Store

Researchers at Lookout Threat Lab have discovered close to 300 mobile loan applications on Google Play and the Apple App Store that exhibit predatory behavior such as exfiltrating excessive user data from mobile devices and harassing borrowers for repayment. These apps, which were found in Southeast Asian and African countries, as well as India, Colombia, and Mexico, purportedly offer quick, fully-digital loan approvals with reasonable loan terms.

Fix common cloud security risks with the Datadog Security Labs Ruleset

With the continual increase of attacks, vulnerabilities, and misconfigurations, today’s security organizations face an uphill battle in securing their cloud environments. These risks often materialize into unaddressed alerts, incidents, and findings in their security products. However, part of the issue is that many security teams are often stretched too thin and overburdened by alert fatigue.

Why You Should Use a Random Password Generator

Roughly 212.4 million Americans were affected by data breaches in 2021, according to a report by Surfshark. Using a weak password is one of the root causes of a data breach. Passwords that contain dictionary words may be easier to memorize, but this also makes them much less challenging for attackers to crack. A password generator removes the task of creating unique passwords for each platform.