Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What are bots costing eCommerce companies?

Netacea recently surveyed 440 businesses from across the USA and UK to understand how much financial impact bot attacks are having across different industries. Read the full results in our report: The Bot Management Review: What Are Bots Costing Your Business? Analyzing the results, it’s clear that those in the retail industry are keenly aware of the financial harm caused by eCommerce bots.

PowerShell Detections - Threat Research Release, August 2021

The Splunk Threat Research Team (STRT) most recently began evaluating more ways to generate security content using native Windows event logging regarding PowerShell Script Block Logging. This method provides greater depth of visibility as it provides the raw (entire) PowerShell script output. There are three sources that may enhance any defender's perspective: module, script block and transcript logging.

Critical Vulnerability in HAProxy (CVE-2021-40346): Integer Overflow Enables HTTP Smuggling

JFrog Security research teams are constantly looking for new and previously unknown vulnerabilities in popular open-source projects to help improve their security posture. As part of this effort, we recently discovered a potentially critical vulnerability in HAProxy, a widely used open-source load balancer proxy server that is particularly suited for very high traffic web sites and used by many leading companies.

Benefits of Cyber Essentials

Cybercriminals constantly target large organisations in the quest to exploit their networks, steal data and extort money. However, it’s well known that SMEs are also targeted with the same level of enthusiasm by cybercriminals. The reason is simple; an attack on a home user gives access to their email passwords which can then be used for social engineering, but an attack directly on a company can lead to the theft of intellectual property and sensitive strategic data.

What Is Log Management and Why you Need it

To remain competitive in the digital age, organizations frequently introduce new hardware devices and software installations to their IT environments. The problem is that these assets might suffer from vulnerabilities that attackers could misuse, if unpatched, to change a device’s configuration or make unauthorized modifications to some of the organization’s important files.

Identity and Access Management - Who You Are & Where You Need to Be

Remember your first day on the job? You might groan just thinking about it, or maybe you are filled with the optimistic nostalgia of all the great things you set out to accomplish. It’s all a matter of your current perspective. One of the greatest apprehensions about that first day is meeting all of your new colleagues. Someone probably gave you a tour of the office, introducing you to all the new faces, as you wondered how you will remember all the names.

Cyber Essentials Scheme: All you need to know

Cyber Essentials and Cyber Essentials Plus are government-backed accreditation for all businesses. It is a certification scheme that requires businesses to meet certain standards and measures to ensure that they are aware of the risks. Which risks? Well, something as simple as malware could affect your business if you don’t have the right controls in place.