Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How To Prevent Data Breaches in The Healthcare Industry

Imagine the worst-case scenario: a healthcare security leader receives a call in the dead of night, informing them that their network has been breached and all systems are down. Even a minor data breach in the healthcare sector can jeopardize patients’ personal health information (PHI), leading to identity theft, medical fraud, financial loss, or even the disruption of critical, life-saving medical services.

GitLab Patches Critical SAML Authentication Flaw: Protect Your Systems from Exploitation

In today's fast-paced digital landscape, security vulnerabilities are constant concerns for organizations that rely on cloud-based services and distributed systems. Recently, GitLab addressed a critical security flaw that affected both its Community Edition (CE) and Enterprise Edition (EE). This flaw, tracked as CVE-2024-45409, has been categorized as a critical vulnerability with a CVSS score of 10.0, the highest possible score, signifying its severity.

Phishing Attacks Abuse Content Creation and Collaboration Platforms

Researchers at Barracuda have observed an increase in phishing attacks that abuse popular content creation and collaboration platforms. These include online graphic design platforms and document-sharing services widely used by educational institutions and businesses. “The analysts found that attackers are sending out emails from these platforms, featuring legitimate-looking posts, designs, and documents, but with embedded phishing links,” the researchers write.

Can You Get Scammed on Cash App?

Yes, you can get scammed on Cash App in a variety of ways, including cash flipping, accidental payments and phishing messages. Cash App scams are harmful because they can swindle you out of money, steal your personal information and even gain access to your Cash App account. Continue reading to learn more about Cash App, several of the most common Cash App scams and how you can avoid becoming a victim of them.

How to Prevent Data Exfiltration

When someone steals important information, usually with the intent of misusing it, the process is called Data Exfiltration. The information can be anything from your customers’ data and financial records to intellectual property. Data Exfiltration otherwise known as Data theft or data exportation refers to the unauthorized transfer of data from a computer or network.

What is an Information Security Management System (ISMS)?

If you’ve spent any length of time reading about the internationally accepted security framework laid out in ISO 27001, you’ve likely come across the term ISMS or Information Security Management System. You may wonder, though; what is the ISMS specifically, how do you set one up, and what does it do for your business? Let’s talk about it.

Chicago API Security Summit 2024

Earlier this week we had the pleasure of hosting a regional API Security Summit in Chicago (well, actually in Lombard). These summits bring together the local cybersecurity community for half-day of API Security-focused content, including expert speakers and panelists. While this isn’t the first time we’ve organized an event like this, it was memorable for the quality of content and participants.

Online Scams Are Shortening Their Cycles and Making More Money

New analysis of blockchain activity shows scammers are needing less time to obtain crypto payments and are seeing higher payoffs per scam. I continue to repeatedly cover breakdowns of cybercrime activity from the folks at Chainalysis because it represents an unbiased view that some security vendors may inherently have (because their data is based on what their solutions do and don’t discover).

Untangling the Web: Why Proper Cabling Matters for Your Data's Safety

You rely on your network every day, but have you considered how its physical infrastructure affects your data security? Discover why proper cable installation is crucial for protecting your sensitive information. Learn about the risks of poor cabling and how professional installation can safeguard your data.

Emerging cybersecurity trends: what tech-savvy users should watch for

The digital landscape is evolving rapidly, and with it, the threats posed by cybercriminals are becoming more sophisticated. Staying informed about the latest cybersecurity trends is crucial for anyone who wants to protect their digital footprint. Here, we delve into key trends that tech-savvy users should be aware of.