Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Visma's Security Boost with Aikido: A Conversation with Nikolai Brogaard

"Aikido helps us catch the blind spots in our security that we couldn’t fully address with our existing tools. It’s been a game-changer for us beyond just the SCA (Software Composition Analysis) solutions we originally brought them in for." A little while ago, we shared that Visma chose Aikido Security for its portfolio companies. Recently, we had the pleasure of having Nicolai Brogaard, Service Owner of SAST & SCA over in our Belgian headquarters.

What Is Risk Based Vulnerability Management?

Risk-based vulnerability management (RBVM) is an approach that focuses on prioritizing vulnerability remediation based on risk. RBVM prioritizes remediating vulnerabilities that pose the greatest risk to an organization. While some organizations depend solely on independent scoring methodologies like CVSS or EPSS, effective RBVM takes into consideration the business criticality of assets and ties in threat intelligence to make prioritization decisions.

What is a social engineering attack? Types of social engineering attacks

A social engineering attack is a form of cybersecurity attack where attackers approach individuals and psychologically manipulate them into divulging sensitive information or performing actions that compromise security. Unlike traditional hacking methods that exploit system vulnerabilities, social engineering preys on human psychology, using the likes of deceit, urgency or trust to bypass defenses.

How Ad Fraud Detection is Saving Money for Customers and Online Retailers

If you’ve ever run an online ad campaign, be it through an advertising agency or in-house, there’s a very high chance that you, too, have fallen victim to undetected ad fraud. It’s not pleasant to hear, but your ad dollars often find their way into the pockets of cyber crooks. The costs of ad fraud are astronomical and continue to grow year after year. In Q1 of 2024, ad networks experienced an 18% click fraud rate across desktop web (26%), mobile web (15%), and mobile in-app (10%).

How to shield your attack surface from SSL misconfigurations

When we carry out an assessment of an organization’s attack surface, it’s often SSL (Secure Sockets Layer) misconfigurations (and other encryption-related issues) that get the worst average scores. Research has estimated that 95% of applications have some kind of misconfiguration or vulnerability. These issues are often overlooked, but they shouldn’t be – their visibility to attackers make them an attack route that’s likely to be exploited.

Managing Third Party and Insider Threats: Building Security Resilience

By James Rees, MD, Razorthorn Security In an era of interconnected services and external partnerships, two critical security challenges loom large: third party risk and insider threats. Recent events highlight these concerns – from the massive breach of Social Security numbers through a service provider to the CrowdStrike incident that grounded major airlines, causing hundreds of millions in damages.

Leveraging Custom IOC Feeds for Enhanced Threat Detection

Indicators of Compromise (IOCs) are vital components in cybersecurity, representing digital clues or evidence that signal a potential security breach or malicious activity in a computer system or network. Think of them as the fingerprints left behind by cybercriminals during or after a cyber-attack. Examples of common IOCs are: Security teams use IOCs as red flags to identify and mitigate threats before they cause significant damage.

Understanding the Importance of XDR

Cyber threats hide everywhere, and the numbers are shocking—more than 80% of companies dealt with a major security problem last year. The usual safety steps just don’t work well enough now leaving too many openings for attackers to sneak through. This is where Extended Detection and Response (XDR) comes in. XDR brings together information from computers, networks, and the cloud into one system giving security teams the power to spot and tackle threats better.

Web Application Security: From Business Risk to Technical Defense

Web applications are many organizations’ primary point of contact with their customers, but they’re also one of their greatest vulnerabilities. Most web applications contain at least one exploitable vulnerability, and the repercussions of a successful exploit can be devastating for an organization or its customers. In this article Web application security focuses on identifying, remediating, and defending web applications to reduce an organization’s vulnerability to attack.

Introducing Account Discovery: Full Visibility and Control over Privileged Accounts

Overlooked privileged accounts represent a serious vulnerability for organizations of all sizes. Syteca’s account discovery feature empowers you to minimize this vulnerability by detecting all hidden privileged accounts and allowing you to manage them with precision. In this post, we’ll explore the benefits of account discovery and take a look at how this feature can strengthen your cybersecurity defenses and protect sensitive data.