Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

PSPF 001-2024: Safeguarding GovTech from Foreign Influence

In 2024, the Australian government introduced PSPF Direction 001-2024 in recognition of the potential threats posed by Foreign Ownership, Control, or Influence (FOCI) on technology assets and GovTech (government technology operations). As part of the Protective Security Policy Framework (PSPF), PSPF 001-2024 is a crucial step in evaluating and mitigating cyber risks associated with foreign interference in the procurement and maintenance of technology assets.

Top Ten Cybersecurity Threats in 2024

In 2024, many organizations and individuals have been affected by cyber attacks. A few of the most common cyber threats are social engineering attacks, password-based attacks and data leaks. Read more to learn about the ten most common cybersecurity threats that have been occurring in 2024 and how to protect yourself and your business against them.

Ransomware Kingpin Who Called Himself "J P Morgan" Extradited to the United States

An investigation dating back almost ten years has seen the extradition this week to the United States of a man suspected to be the head of one the world's most prolific Russian-speaking cybercriminal gangs. The UK's National Crime Agency (NCA) says it has been investigating a cybercriminal using the online handle "J P Morgan" since 2015, alongside parallel investigations run by the United States FBI and Secret Service.

Are "iPhone Hacked" Pop-Ups Real?

As you’re browsing the internet on your phone, you encounter a pop-up message saying, “Your iPhone has been hacked!” The message claims your device has been infected with malware. Is this message even real? No, pop-ups claiming that your iPhone has been hacked are not real. These kinds of pop-ups are scams that cybercriminals create intending to scare you into clicking them. After you click on these pop-ups, malware can start downloading on your device.

InCyber Forum Europe recap: 4 tips from DevSecOps experts

As your organization considers how to shift security left and facilitate shared responsibility for fixing issues, it can be tricky to know where to start. Which tooling will work best with your existing processes? What are the best ways to spread the word about the importance of application security? And once you’ve chosen tools, how do you actually get developers to use them?

CCRI renamed Cyber Operational Readiness Assessment (CORA)

The Command Cyber Readiness Inspection(CCRI) is a comprehensive cybersecurity evaluation and assessment conducted by the United States Department of Defense (DoD). A CCRI serves as a formal inspection aimed at enhancing accountability and bolstering the security posture of DoD Information Networks in alignment with DoD standards, with a specific focus on Command, Mission, Threat, and Vulnerability.

Unifying Security Across Environments with Calico

As companies build more cloud-native apps, securing them across different infrastructures becomes a challenge. Cloud-native apps leveraging different deployment environments such as on-premises, public cloud, or hybrid have different security challenges as they are scaling, interoperable, and cost-effective.

Introducing XIAM: A fresh approach to external identity and access management

Over the past few years, the identity security industry has been buzzing with terms like “convergence.” These days, it feels like everyone offers a “unified” cybersecurity platform. It’s as if we all woke up one day in 2021 and realized that solving our identity security problems with a siloed array of “best-in-breed” point solutions could leave gaps in coverage or create confusion with overlapping functionalities.

Updates and Evolution of the NIST Cybersecurity Framework: What's New?

The NIST Cybersecurity Framework (CSF), published by the US National Institute of Standards and Technology (NIST), is a widely used set of guidelines for mitigating organizational cybersecurity risks. It contains recommendations and standards to help organizations identify and detect cyberattacks and advice on how to respond, prevent, and recover from cybersecurity incidents.

We Made It! Nucleus Placed 267 on Inc. 5000 Fastest Growing Companies

This week, Nucleus can add another accolade to a growing list, being listed as number 267 on Inc. Magazine’s list of the 5000 fastest-growing companies in America. We are proud of the growth we’ve achieved as a company and the potential for the future at Nucleus. Looking more closely at the results, we are the fourth fastest-growing security company on the list. As many people know, the cybersecurity and technology market has been tumultuous recently.