Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Attackers Target Crypto Wallets Using Codeless Webflow Phishing Pages

From April to September 2024, Netskope Threat Labs tracked a 10-fold increase in traffic to phishing pages crafted through Webflow. The campaigns target sensitive information from different crypto wallets, including Coinbase, MetaMask, Phantom, Trezor, and Bitbuy, as well as login credentials for multiple company webmail platforms, as well as Microsoft365 login credentials.

Four Ways to Streamline Your Security Review Process

Security reviews of third-party vendors are now an essential element of an effective governance, risk, and compliance (GRC) function. After all, there have been numerous examples in recent years of organizations with an otherwise strong security posture falling victim to threats that originated with supply chain partners. But whether you are on the sending or receiving end of a security review, completing the process can be time-consuming and inefficient.

Training a million models per day to save customers of all sizes from DDoS attacks

Our always-on DDoS protection runs inside every server across our global network. It constantly analyzes incoming traffic, looking for signals associated with previously identified DDoS attacks. We dynamically create fingerprints to flag malicious traffic, which is dropped when detected in high enough volume — so it never reaches its destination — keeping customer websites online. In many cases, flagging bad traffic can be straightforward.

A Secure VPC as the Main Pillar of Cloud Security

In 2019, the Capital One breach led to the exposure of 100 million customers’ personal data due to a misconfigured WAF. The incident ultimately cost Capital One over $270 million in fines and compensation, demonstrating the serious risks inherent in cloud security and highlighting the urgent need for robust security measures. As cloud adoption accelerates, public cloud services spend is expected to jump 20.4% versus 2023, reaching $675.4 billion this year.

How Calico Helps with PCI Compliance for Containers and Kubernetes

The Payment Card Industry Data Security Standard (PCI DSS) is a global standard designed to ensure the security of cardholder information. It is crucial for any organization that stores, processes, or transmits payment card data to comply with PCI DSS to protect the integrity and confidentiality of cardholder information.

Introducing Access for Infrastructure: SSH

BastionZero joined Cloudflare in May 2024. We are thrilled to announce Access for Infrastructure as BastionZero’s native integration into our SASE platform, Cloudflare One. Access for Infrastructure will enable organizations to apply Zero Trust controls in front of their servers, databases, network devices, Kubernetes clusters, and more. Today, we’re announcing short-lived SSH access as the first available feature.

Defending Against Ransom DDoS Attacks

DDoS attacks have become an annoyance most companies assume they may have to deal with at some point. While frustrating, minor website disruptions from small-scale hacktivist campaigns rarely create substantial business impacts. However, a particularly insidious DDoS spinoff has emerged over the past decade – one aimed at blackmail. This evolutionary milestone stems from what's called Ransom DDoS (RDDoS), likely one of the most outrageous cybercrime weapons targeting businesses globally since 2015.

New IDC InfoBrief + downloadable CISO checklists

Tl;dr: This blog discusses IDC’s 2024 study, “The Future of Access Management: Identity Security Requirements for a Modern Application Access Approach.” The study identifies the biggest challenges facing security leaders today, especially those exacerbated by hybrid work. Below are IDC’s findings as well as downloadable checklists that security practitioners can use to address the security gaps in their organizations.

10 Unavoidable Benefits of Guest Posting That You Shouldn't Miss

In this increasingly saturated digital realm where every other minute, a new business emerges - It can be daunting for a business to stand out easily. When every other business is struggling to gain similar attention from the audience, retaining and attracting new customers may seem like an unachievable goal. If you're thinking the same and struggling to be on top of search engine result pages (SERPs), you must be overlooking the benefits of guest posting in your SEO practices.