Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What are the benefits of an incident response retainer?

A cyber incident response retainer can help businesses to better manage both the financial and security risks posed by constantly evolving threats. This article outlines the benefits of the retainer model and also covers what organisations should look for in a potential provider.

Deep Dive into the Latest API Security Vulnerabilities in Envoy

Envoy has carved out a critical role in cloud-native computing, becoming increasingly prevalent as the default ingress controller for Kubernetes. This high-performance proxy, developed by Lyft and now part of the Cloud Native Computing Foundation’s arsenal, is integral for companies scaling up their Kubernetes deployments. Envoy ensures efficient load balancing, security, and operational agility by managing external access to services within Kubernetes clusters,.

CDK Ransomware Attack: What It Is and How to Protect Your Business

Software platforms are being used more and more by companies to run their operations, store private data, and talk to customers. Ransomware attacks are becoming more common because people depend on them so much. One of the scariest types of hacks is the CDK ransomware attack, which is aimed at companies that use software from CDK Global.

Critical RCE Vulnerabilities Impacting HPE Aruba Networking Access Points

On September 24, 2024, Hewlett Packard Enterprise (HPE), the parent company of Aruba Networks, released a security bulletin addressing three critical command injection vulnerabilities affecting Aruba Networking Access Points. These vulnerabilities, identified as CVE-2024-42505, CVE-2024-42506, and CVE-2024-42507, could allow remote unauthenticated attackers to execute code with privileged access.

Navigating the Future: Key EU Cybersecurity Regulatory Frameworks for 2024-2029

The European Union (EU) is leading the development of comprehensive cybersecurity regulations. These frameworks shape secure digital environments and protect businesses and citizens from cyber threats. For industry leaders and cybersecurity practitioners, especially those focused on cloud technologies, understanding and navigating these frameworks is key to maintaining compliance and gaining a competitive edge.

Sequoia spotlight: Deploying the newest macOS with Endpoint Central

Apple released its new macOS Sequoia 15.0 on Sept. 16, and we at ManageEngine are excited to announce our support from the day of its release. Before we get into the details, let’s look at which devices are eligible for the facelift. Source: Apple Sequoia was unveiled at WWDC 2024 with a range of features around privacy, security, and its much-awaited Apple Intelligence.

How To Detect Spyware on an Android Phone

You can detect spyware on an Android phone by recognizing the following signs: your phone suddenly becomes slow, the battery drains quickly, unfamiliar apps appear, it overheats frequently, you receive strange messages or it makes weird noises during phone calls. Spyware is a form of malware installed onto your device without your knowledge. Once spyware is installed, a cybercriminal can spy on you and collect private information like passwords or credit card numbers.