Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

10 Thought-provoking Questions to Contemplate GenAI Data Security

In the age of generative AI, data security is a key concern for organizations to manage. In my previous blog post, I dug into how modern SSE technology helps to better secure genAI. The recently published ebook Securing GenAI for Dummies offers further clarity on strategies organizations can use when it comes to securing and enabling genAI apps. With that in mind, we’ve compiled 10 essential questions to keep in mind as you assess your data security, along with how Netskope can help address them.

What is Web Scraping and How It Works?

Confused and want to know what in the world web scraping is and how it works? Well you’ve come to the right place because we’re about to lay down everything for you. Before we dive in, I can already tell you the short version: Web scraping is the process of extracting publicly available data from a website. Join us to learn more about the specifics, how it works, and popular libraries that exist.

Building a Robust Defense-in-Depth Architecture for Digital Transformation

Today's businesses are transforming through integrating IT and OT environments, a shift that's enhancing efficiency and unlocking new operational capabilities. Key functionalities like remote access and telemetry collection are becoming increasingly central in this digitally integrated landscape.

DDoS threat report for 2024 Q2

Welcome to the 18th edition of the Cloudflare DDoS Threat Report. Released quarterly, these reports provide an in-depth analysis of the DDoS threat landscape as observed across the Cloudflare network. This edition focuses on the second quarter of 2024. With a 280 terabit per second network located across over 230 cities worldwide, serving 19% of all websites, Cloudflare holds a unique vantage point that enables us to provide valuable insights and trends to the broader Internet community.

3 trends shaping the future of GRC and how to adapt today

For many teams, managing governance, risk, and compliance (GRC) is still a very manual process. As a security leader, you might be wondering how to future-proof and scale your GRC program when so much of your team’s time is spent on collecting screenshots or copying and pasting information from one spreadsheet to another. ‍ The future of GRC management doesn’t have to be more of the same though.

Amazon-Related Scams Spike Ahead of Prime Day

Researchers at Check Point observed more than a thousand newly registered malicious or suspicious web domains related to Amazon last month. The criminals are likely gearing up to target users during Amazon Prime Day next week. “While Prime Day offers incredible savings, it is crucial for shoppers to remain vigilant, exercise caution while clicking on links or providing sensitive information, and ensure they are navigating legitimate platforms,” the researchers write.

8 Ways to Combat Credential Stuffing and Brute Force Attacks

We’re in an era of connectivity and convenience, but this has also opened the floodgates to a new wave of cyber threats. Among the most insidious and pervasive is credential stuffing, a cyberattack that exploits the human tendency to reuse passwords across multiple online accounts. This threat is more than just a digital inconvenience. Verizon’s 2024 Data Breach Investigations Report reveals that more than 49% of breaches caused by external actors involve stolen credentials.

What is NGFW? Next generation firewall VS traditional firewall

Protecting an organization’s network perimeter has become increasingly complex. Traditional firewalls, once the cornerstone of network security, are now being supplemented and often replaced by more advanced solutions known as Next-Generation Firewalls (NGFWs). At Obrela, we believe in leveraging cutting-edge technologies to safeguard digital assets, and understanding the differences between traditional firewalls vs NGFWs is crucial for any robust security strategy.

RADIUS/UDP vulnerable to improved MD5 collision attack

The MD5 cryptographic hash function was first broken in 2004, when researchers demonstrated the first MD5 collision, namely two different messages X1 and X2 where MD5(X1) = MD5 (X2). Over the years, attacks on MD5 have only continued to improve, getting faster and more effective against real protocols. But despite continuous advancements in cryptography, MD5 has lurked in network protocols for years, and is still playing a critical role in some protocols even today.