Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The Legal Checklist for Business Sellers

Selling a business requires careful planning and legal groundwork, whether for retirement purposes, transition into another venture, or cash out. Ensuring your business is ready for acquisition is of equal importance as financial stability or market position considerations; without adequate legal preparation, you risk losing value or facing surprises during its sale process.

Elevating Comprehensive Security with Counter-Drone Solutions

The threat of drones to critical infrastructure and general security, therefore, is an issue that is increasing in today's connected world. Those could be operating a lot of unauthorized activities such as aerial surveillance, creating red flags for privacy and safety, among others, to more hazardous and serious incidents of sabotage that may disrupt basic services.

SquareX Researchers Expose OAuth Attack on Chrome Extensions Days Before Major Breach

SquareX, an industry-first Browser Detection and Response (BDR) solution, leads the way in browser security. About a week ago, SquareX reported large-scale attacks targeting Chrome Extension developers aimed at taking over the Chrome Extension from the Chrome Store.

December Release Rollup: Audio Input in Egnyte Copilot, Procore Integration - Photos and Metadata Sync, and More

We’re excited to share new updates and enhancements for December, including: For more information on these updates and others, please read the complete list below and follow the links for more detailed articles.

A White Hat's 2024 Reflections: Cybersecurity Insights and Lessons

As 2024 comes to a close, today, I’m reflecting on some of the key events and trends that shaped my offensive security research this year. From publishing my first book to writing regular blogs on some of cybersecurity’s hottest topics, each piece has contributed to a clearer understanding of the evolving digital landscape.

What Is Digital Forensics? A Key to Solving Cybercrimes

Digital forensics, which is sometimes called the "science of the digital age," is very important for finding digital proof and solving cybercrimes. Because of how connected everything is these days and how almost everything leaves a digital trail, digital forensics gives us the methods and tools to find, collect, study, and keep data for future investigations.

Security Bulletin: Critical Remote Code Execution Vulnerability in Apache Struts [CVE-2024-53677]

A newly discovered critical vulnerability, CVE-2024-53677, in Apache Struts enables remote code execution (RCE) and is actively exploited in the wild using a publicly available Proof-of-Concept (PoC). Apache Struts is an open-source framework for building Java-based web applications. It helps developers create scalable software solutions, that powers everything from e-commerce websites to financial systems and government platforms.

Zero Trust in 2025: 5 Sensitive Areas to Prioritize

From external collaboration and compliance to key financial info and intellectual property, here are five areas that need Zero Trust as a priority. In mid 2024, Gartner research found that 63% of global organizations had fully or partially-implemented a Zero Trust strategy, but these strategies only covered a small portion of the organization’s environment and that many enterprises were still “not sure what the top practices are for Zero Trust implementations.”

UpGuard's Updated Cyber Risk Ratings

Each year, we revisit our risk rating system to ensure it best reflects the needs of security practitioners safeguarding their organizations and supply chains. For our recentupdate, we’ve made two closely related changes: we’ve recategorized some of our existing findings to make an organization’s risk profile more understandable and recalibrated our scoring algorithm to more clearly illustrate the impact of specific risks.

Importance of Password Encryption for Data Protection

In this digital age, where cyber threats are always evolving, keeping private data safe has become important for both people and businesses. Encrypting passwords is an important part of data security because it keeps user information hidden from attackers who shouldn't have access to them. Advanced algorithms are used to encrypt passwords into unreadable form. This makes encryption a strong defense against breaches and identity theft.