Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What is ML-based monitoring and alerting?

Machine learning (ML) has significantly evolved since its conception in the 1950’s. One of the minds behind the technology and field of study was Alan Turing, a computer scientist and artificial intelligence (AI) pioneer. Turing famously challenged the expectations and limitations of computers by posing the question, “Can machines think?”

How to Install VMware Tools on Linux, Windows, MacOS, FreeBSD and Solaris

If you have ever deployed a VMware VM on VMware ESXi, VMware Workstation, VMware Player, or VMware Fusion, you’ve probably noticed that after installing a guest operating system (OS), you are asked to install VMware Tools. In this blog post, we cover what VMWare Tools is and the VMware Tools installation process on different operating systems including Linux, Windows, macOS, FreeBSD, and Solaris.

UKAS Accredited and Non-accredited ISO Standards

Imagine you’re in a busy market. Every stall owner is shouting, “I’ve got the best apples!” How do you know who to trust? The answer is you look for the one with the 5* sourcing certification, issued by trusted food inspectors that have been certified by the authority on apples! UKAS (United Kingdom Accreditation Service) are like the authority on apples in this scenario.

Deepfakes, Shallow Morals: The Real Issue Behind the UK's Crackdown

The UK government decided to wage war on explicit deepfakes. About time, right? But before we start celebrating, let's take a closer look. The fact is that this isn’t about technology, it’s about human behaviour. The government is not trying to outright ban deepfakes, which would be impossible, to be honest. They're targeting the misuse of this tech for nefarious purposes.

Ransomware Annual Report 2024

In 2024, the ransomware landscape recorded 5,414 published attacks on organizations worldwide, representing an 11% increase compared to 2023. While the year began with a decline in ransomware activity during Q1, the frequency of attacks surged in Q2 and continued to rise through the remainder of the year. This culminated in a dramatic spike during Q4, which saw 1,827 incidents—33% of all ransomware attacks for the year—making it the most active quarter.

Multi-factor Authentication for Active Directory: Fighting MFA Fatigue Attacks

In 2024, cyberattacks aimed at MFA flaws increased by an astounding 40%. This concerning pattern indicates a sharp rise in the complexity of cyberthreats that businesses now have to deal with. Cybercriminals are now adopting psychological strategies in addition to technical ones, such as MFA fatigue attacks, which alter human behavior to obtain unauthorized access to vital systems. This is a wake-up call, not just a number.

Is Facebook Marketplace Really Safe? Find Out

By bringing people in the same area together, online markets like Facebook Marketplace have changed the way people buy and sell things. But this ease of use comes with possible risks, which makes many people wonder: is Facebook Marketplace safe? Every day, millions of people use the site successfully, but there are also a lot of frauds, scams, and safety concerns. Statista says that over 1 billion people use Facebook Marketplace every month, which makes it a great target for hackers.

Single sign-on (SSO), simplify access and protect your business

Enterprises today are facing a complex working environment, where digitalization is advancing by leaps and bounds and technological tools are multiplying. This change has brought with it a key challenge: protecting and managing access to sensitive data. IT teams are overloaded with password-related tickets, while employees are dealing with multiple credential-management fatigue, a problem that affects both productivity and security.

CISO predictions: What does 2025 hold for attack surface management (ASM)?

We’ve asked Outpost24’s CISO, Martin Jartelius, what 2025 is likely to hold for organizations using attack surface management (ASM) tools. Here’s what Martin had to say about what he predicts for ASM in 2025, as well as some thought on how the CISOs role might change.