Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

6 Key Principles of AI and Data Protection: How the AI Act Safeguards Your Data

Artificial Intelligence (AI) plays a critical role in modern data handling. AI processes vast amounts of data, from personal information to business analytics, at unprecedented speeds. This raises serious concerns about AI and data protection. With AI’s growing capabilities, ensuring the security of personal data is essential. The AI Act aims to regulate AI systems, focusing on responsible data usage. It introduces rules that safeguard user data, complementing existing regulations like GDPR.

Shift left with the Sysdig extension for Visual Studio Code

Adversaries exploit security blind spots and sneak through traditional defenses to craft attacks that impact your operations, or even worse, your reputation. One recent example is the Revival Hijack supply-chain attack, where threat actors registered new PyPi projects with names of previously deleted packages. One way to counter this imminent threat is to “shift left,” or take ownership of the code’s security posture earlier in the development process.

Why Do Criminals Love Phishing-as-a-Service Platforms?

Phishing-as-a-Service (PaaS) platforms have become the go-to tool for cybercriminals, to launch sophisticated phishing campaigns targeting the general public and businesses, especially in the financial services sector. PaaS operates much like other subscription-based malware models, where cybercriminals offer phishing kits, including spam tools, phishing pages’ templates, bulletproof servers, and victim databases to less-experienced attackers.

Fireblocks x Lido Institutional: Bringing Liquid Staking to the Fireblocks Network

In response to growing institutional demand, Fireblocks has launched an integration with Lido to provide easy and secure in-platform access to Lido’s liquid staking protocol and stETH token. Users can now stake their ETH, receive rewards, and use stETH for on-chain activities, including Fireblocks Off Exchange, which allows Fireblocks users to lock their stETH in a self-custodial collateral wallet to trade on exchanges like Deribit and Bybit.

What Is PGP Encryption and How Does It Work?

You’re working late Thursday evening as a contractor for a powerful government agency. You stumble across classified documents uncovering a surveillance program that invades the privacy of millions of citizens. Your heart races as you decide to expose this to the masses and enlist the help of a few journalists. But you also know the organization you work for monitors emails (and other forms of communication). If your emails hit the wrong eyes, you could face severe penalties.

Educate Your Users About Malicious SEO Poisoning Attacks

Since the beginning of computers, social engineering has been the number one way that computers and networks have been compromised. Social engineering is involved in 70% to 90% of all successful data breaches. Nothing else is even close (unpatched software and firmware are involved in 33% of successful attacks, everything else is 1% or less).

Disable HTTP Trace Method in IIS - no one likes a parrot

The primary function of the HTTP trace method (aka trace or track verbs) is as a diagnostic tool used in web servers. It works by echoing back the received request so that the client can see what changes or additions have been made by intermediate servers. Essentially, when a client sends a TRACE request to a server, the server responds by sending back the exact request it received, including all the headers.

How DevOps Automation Enhances Cloud Security

When applied to cloud security, DevOps automation is able to speed up delivery while cutting down on errors. This blend results in faster deployments with a lower likelihood of vulnerabilities sneaking through. Here's a closer exploration of how this plays out, and why you should be making the most of tools in this category as part of your own operations.