Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Breaking Down Signature-Based Detection: A Practical Guide

Nearly 90% of cyberattacks are known methods that proper systems can detect, but most organizations don’t have the best defenses. Signature-based detection is a vital aspect of cybersecurity. It offers some benefits but also has some drawbacks. This blog will break it down simply to help you strengthen your defenses against new threats.

The Life of Pi - Privacy Leaders and Their Everyday

In today’s data-driven economy, enterprises are under increasing pressure to manage privacy risks effectively. The responsibility of identifying and mitigating these risks often falls on lawyers and Chief Data Privacy Officers (CDPOs), who must navigate complex regulatory landscapes, safeguard sensitive data, and ensure their organizations maintain customer trust.

11:11 Systems Object Storage in Veeam Data Platform 12.3

With the 12.3 release of the Veeam Data Platform, integrating 11:11 Systems’ low-cost, Veeam-optimized Cloud Object Storage just got a whole lot easier. Now directly built into the Veeam UIs for both Backup & Replication and Veeam ONE, this integration gives you the best of both worlds—a seamless, streamlined setup and the unmatched efficiency of 11:11 Systems’ partnership with AWS S3.

Achieving PSN Compliance: Why It Matters for Your Organisation

The PSN compliance certificate ensures organisations meet stringent security requirements, paving the way for improved operational integrity. Moreover, compliance can enhance organisational value, guiding strategic decisions and fostering a culture of accountability.

Inside APT34 (OilRig): Tools, Techniques, and Global Cyber Threats

This blog is the latest in a series that delves into the deep research conducted daily by the Trustwave SpiderLabs team on major threat actor groups currently operating globally. APT34, also known as OilRig, Earth Simnavaz, and Helix Kitten, is a sophisticated, state-sponsored cyber threat group with suspected ties to Iran.

What Is Data Poisoning: Everything You Need To Know

Data poisoning is a type of attack targeting machine learning systems. It involves introducing false or misleading data into a training dataset. This can lead to flawed or malicious outputs from the model. Imagine a machine learning system trained to distinguish between cats and dogs. If poisoned data featuring mislabeled images is fed into it, the system could start making mistakes. It might misidentify a cat as a dog or vice versa.

Unmasking Shadow AI: What Is it and How Can You Manage it?

Since the launch of ChatGPT in late 2022, gen AI (generative artificial intelligence) has transformed nearly every facet of our lives, including our professions and workplace environments. Adoption has been driven by employees looking for faster, better ways to perform. For example, applications like ChatGPT, DALL-E, and Jasper are helping employees across industries boost productivity, overcome roadblocks, and brainstorm creative solutions.

Operation Phantom Circuit: North Korea's Global Data Exfiltration Campaign

In December 2024, a routine software update concealed a global threat. Attackers from the Lazarus Group, based in North Korea, infiltrated trusted development tools, compromising hundreds of victims worldwide. This sophisticated campaign, code-named “Phantom Circuit,” targeted cryptocurrency and technology developers, employing advanced obfuscation techniques through proxy servers in Hasan, Russia.

Redefining Transparency: Netskope Trust Portal 2.0 and DEM

In the world of cloud services, transparency has often been treated as a box to check rather than a cornerstone of innovation. Trust and status portals, once an innovative approach for offering visibility into service health and availability, now largely feel stagnant and table stakes providing the bare minimum. But is transparency and visibility just a “nice-to-have”? Some might think so. At Netskope, we see it differently.