Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

FBI Warns Scammers Are Targeting Law Firms For Phony Debt Collections

The U.S. FBI warns that scammers are attempting to trick law firms into transferring money as part of a phony debt collection scheme. The scam “may focus on any type of representation where a lawyer is hired to assist in the transfer or collection of money, e.g. real estate, collection matters, collaborative law agreements in family matters, etc.” The schemes typically take the following steps: The FBI outlines some recommendations to help organizations avoid falling for these scams.

Ekran System Is Now Syteca

We’re excited to announce that at long last, our highly anticipated brand refresh is complete: Ekran System Inc. is now officially Syteca Inc.! Our new name reflects the evolution of our product and our growth as a trusted provider, delivering the capabilities needed to enhance your organization’s cybersecurity. The same team behind Ekran System now brings you the Syteca platform: a more powerful and flexible software solution to meet your unique cybersecurity needs.

Creating noise: The emerging obfuscation technique designed to evade email security NLP detection capabilities

Our Threat Intelligence team has observed an emerging obfuscation technique, specifically used to make Natural Language Processing (NLP) detection capabilities less effective. Broadly, malicious actors are adding additional characters, break lines, and legitimate links to the end of a phishing email in an attempt to disguise their malicious payloads amongst the noise and evade NLP detection.

Streamlining Security Documentation for London SMEs

Security documentation is a huge concern for small and medium businesses in London due to the rapidly changing business environment. As these companies start doing more things online, security documentation is not an option but a dire need. With good security documentation, you will be able to protect all the vital information and compliance requirements. How can your business be managed effectively? Let's have a look at the essentials.

The states of data, Part 4: Securing data in motion through treacherous transits

In our previous blog, Data in use and why you need to keep an eye on file activities, we discussed why you should monitor how your data is being used, threats to data in use, and how you can protect it. But, when your data is on the move, you need other security capabilities to secure it. In this blog, we’ll explore data in motion. Gone are the days when you’d simply store your data in your local database and share it with peers when required.

Teleport delivers "crown jewel observability" with access control monitoring for critical infrastructure resources

New updates to Teleport Policy enable security professionals to cut through the noise of alert fatigue, with "Crown Jewel" tagging and monitoring for access variances in critical resources.