Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

CVE-2024-42448: Veeam Discloses Critical RCE Vulnerability in Service Provider Console

On December 3, 2024, Veeam disclosed a critical vulnerability within the Veeam Service Provider Console (VSPC), tracked as CVE-2024-42448, which was discovered during internal testing. VSPC is a management tool designed for service providers to manage customer backups. The vulnerability allows a remote threat actor to perform Remote Code Execution (RCE) on the VSPC server machine from an authorized VSPC management agent machine.

Phishing Attacks Impersonating Big Brands Starts to Zero in on Just One Brand

The latest data on brand phishing trends shows one brand dominating quarter over quarter, but also continuing to take on a larger share of the brand impersonation. Take a guess which brand tops the list as the most impersonated in phishing attacks? If you guessed Microsoft, you’d be right. You’d also have been right last quarter, and the quarter before that – according to Check Point Research.

Scale Quickly with a Partner Focused on Growth

Cloud computing is no longer just a choice—it’s a necessity for modern organizations aiming to thrive in today’s business environment. Infrastructure scalability, cost management, and multi-layered security are driving organizations toward cloud solutions. But finding the right partner to guide this transition is often the biggest challenge. High Point Networks, an established IT services provider, successfully tackled this challenge by partnering with 11:11 Systems. The result?

Security Culture: Moving Beyond Basic Awareness Training

By James Rees, MD, Razorthorn Security The landscape of cybersecurity awareness has changed dramatically in the last 25 years. What began as simple password guidance and basic IT training has evolved into a complex web of security challenges that organisations must navigate daily. Back in December 1999, the world held its breath waiting for the Y2K bug to wreak havoc on computer systems globally.

Seven steps to close coverage gaps with ASPM

The old adage “knowledge is power” holds especially true in the realm of AppSec. By remaining aware of the potential threats to applications and closing gaps in coverage, AppSec teams can demonstrate to leaders that they are in a solid position to protect vital assets. However, visibility is riddled with challenges, not the least of which are highly productive developers racing to market, often using AI-generated code that contains potential security issues.

Logins Are Cheap. Peace of Mind Is Priceless.

Imagine a typical morning at an enterprise: employees, remote workers, contractors and partners log in, browsing and accessing apps and files they need to do their jobs. All seems calm. But behind the scenes, security teams face a different reality. They’re managing an explosion of high-risk identities and passwords across countless endpoints, dealing with unchecked admin rights, rising security costs and compliance pressures.

2024 Open Source Security Report: Slowing Progress and New Challenges for DevSecOps

Trust is the foundation of the open source community — but what happens when that trust is betrayed? When a backdoor vulnerability was found in a widespread Linux-based data compression tool, it nearly created an opportunity for malicious actors to seize control of countless computers worldwide. The vulnerability was introduced by a trusted contributor who, after years of building rapport with maintainers, ultimately exploited that trust.

Eight Essential Steps for Securing Digital Marketing Data

When your hunches no longer work to keep up with the ongoings, especially in the digital world, data is the king to be shielded at all costs. However, as digital marketing campaigns and strategies level up, so do the risks of data breaches and hacking activities. That's why protecting your campaign materials, data, and customer information is now quite essential, and there's no other way of doing it if you want to scale your business. So, to make sure your digital marketing "assets" remain secure, here are eight practical and crucial steps you can maximize.

Affordable Surveillance Solutions for Robust Commercial Security: Enhancing Protection Without Breaking the Bank

In today's dynamic business landscape, maintaining security is essential for protecting assets and ensuring safety. With rising concerns over theft and vandalism, businesses often seek solutions that are both effective and budget-friendly. Affordable surveillance solutions can significantly enhance commercial security without straining financial resources.