Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Steps To Strengthen Banking Application Security

Let us explore how enhancing the protection of banking applications throughout the software development lifecycle can lead to improved regulatory compliance, increased application security, and reduced development costs. Banking applications are often prime targets for attackers, who seek to disrupt accessibility and compromise sensitive information, including credit card data. Furthermore, vulnerabilities in online applications can grant unauthorized access to corporate networks and server programs, enabling criminals to alter or steal data directly from the applications.

NAKIVO Launches v11 with Powerful Cybersecurity Features and Advanced Support for Proxmox VE, Microsoft 365, and NAS

NAKIVO Inc., a global leader in data backup and recovery, is excited to announce the launch of NAKIVO Backup & Replication v11, the newest version of its award-winning solution designed to meet the expanding needs of today's virtual and cloud-based environments. This release includes advanced data protection capabilities for Proxmox VE, Microsoft 365, and NAS while introducing key cybersecurity and compliance enhancements.

ISO 27001 Audit Checklist: What Can You Expect?

The full process for achieving ISO 27001 compliance is lengthy, expensive, and difficult. While you can take many steps to make it easier, faster, or cheaper, there’s only so much you can sidestep the ground-level legwork that needs to be done to succeed. Fortunately, we can help you smooth out the process. A few weeks ago, we published a checklist for the full process to achieve ISO 27001 certification.

FBI Warns of Cybercriminals Using Generative AI to Launch Phishing Attacks

The US Federal Bureau of Investigation (FBI) warns that threat actors are increasingly using generative AI to increase the persuasiveness of social engineering attacks. Criminals are using these tools to generate convincing text, images, and voice audio to impersonate individuals and companies. “Generative AI reduces the time and effort criminals must expend to deceive their targets,” the FBI says.

New Measures Signal Progress for Stalking Victims in the UK

The Home Office has introduced new guidance aimed at strengthening protections for stalking victim-survivors in England and Wales. Under the updated measures, police will be required to inform individuals if they uncover the identity of a stalker, including those operating anonymously online. Additionally, stalking protection orders will be toughened to prevent convicted stalkers from contacting their victims while in prison.

Best Practices for Securing Git LFS on GitHub, GitLab, Bitbucket, and Azure DevOps

Git Large File Storage (Git LFS) is an open-source Git extension that handles versioning for large files. It optimizes git repositories by storing data separately from the repository’s core structure, making it much easier for developers to manage binary assets. However, such an efficiency requires proper security and configuration to function optimally. Utilizing best practices, like access control, encrypted connections, and regular repository maintenance, firmly secures the Git LFS performance.

The Rise of Phishing Attacks: How New Domain Extensions Are Fueling Cyber Crime

In recent years, the world of cybersecurity has witnessed a concerning trend: a significant increase in phishing attacks. A new study reveals that these attacks have surged by nearly 40% in the year ending August, 2024. What's particularly alarming is the role played by new generic top-level domains (gTLDs) in this spike. While gTLDs like.shop, .top, and.xyz make up only 11% of new domain registrations, they account for a staggering 37% of reported cybercrime domains.

Why Controversial Phishing Emails Do Not Work

Frequently, when a cybersecurity training manager sends out a controversial simulated phishing attack message that angers a bunch of employees and ends up making headlines, we get called by the media to comment on the story. Here are some examples of potentially controversial simulated phishing messages: I have read many stories of security awareness training managers sending simulated phishing emails with these types of messages, often around Christmas or other national holidays.