Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

New Ransomware Threat Group, RansomHub, is so Effective, the NSA is Already Warning You About Them

The latest evolution of the ransomware service model, RansomHub, has only been around since February of this year, but its affiliates are already successfully exfiltrating data. You know you’re a problem when the U.S. government puts out a notice about you. That’s the case for RansomHub — the latest iteration of a ransomware as a service group formerly working under the names Cyclops and Knight.

Authorized Push Payment Fraud Responsible for Over Half of U.K. Frauds and Scams

Research from The Financial Ombudsman Service, a U.K. based organization dedicated to helping citizens with free financial advice, has found an increase in Authorized Pushed Payment (APP) scams. These attacks are rising both in number and sophistication. The Financial Ombudsman Service is a U.K. organization dedicated to helping residents with all things financial-as-a-free service. As part of this service, they take in a large number of complaints around financial fraud.

BEC Scams Have Caused $55 Billion in Losses Over the Past Ten Years

Business email compromise (BEC) attacks have caused more than $55 billion in losses between 2013 and 2023, according to an advisory from the U.S. Federal Bureau of Investigation (FBI). “The BEC scam continues to target small local businesses to larger corporations, and personal transactions while evolving in their techniques to access those business or personal accounts,” the FBI says.

A Comprehensive Guide to Today's IGA Solutions: Features, Benefits, and Options

Let’s face it. Managing and securing IT networks is far more complex today. Beyond securing endpoints, sensitive data, and the network perimeter, security teams must also focus on identity security, access management, and regulatory compliance. They not only have to create password policies but protect those passwords and access privileges. Twenty years ago, no one had to worry about things such as cloud identity. Today, a different world demands a different set of tools.

NCSC sets out plans to launch Advanced Cyber Defence 2.0

An initiative of the National Cyber Security Centre (NCSC) since 2017, the Active Cyber Defence (ACD) programme has provided a range of free cyber security tools and services to enable eligible public sector organisations to address high-volume commodity attacks. Following on from its success, the NCSC has announced plans to launch a new version of ACD, aimed at extending its benefits to businesses.

Focusing on the WHY: Jit Enables Developers to Understand the Runtime Context for Security Issues

While code and cloud security scanners are great at identifying code flaws and cloud misconfigurations, they can bombard developers with long lists of potential security “issues” – many of which don’t introduce real risk. Whether insecure code introduces real risk depends on a number of factors, like whether it is being deployed to production, is exposed to the internet, or calls a sensitive database.

Five Reasons Small Businesses Need a Password Manager

Your small business should rely on a password manager to ensure your employees use strong passwords, to simplify onboarding and offboarding processes, securely share files, avoid potentially losing money from a cyber attack and improve employee productivity. A business password manager allows you and your employees to store and protect all passwords, with each employee having their own digital vault.

Want to avoid a data breach? Employ secrets detection

As a software developer, ensuring the security of your applications is paramount. A crucial part of this task involves managing secrets and employing a secrets detection tool. In this context, secrets refer to sensitive data such as API keys, database credentials, encryption keys, and other confidential information. Their unauthorized access or exposure can lead to catastrophic consequences, including data breaches and severe business losses.

Apple Halts Spyware Lawsuit to Protect Sensitive Security Operations

In a surprising move, Apple has filed a motion to drop its high-profile lawsuit against NSO Group, the Israeli developer of Pegasus spyware. The lawsuit, originally filed in November 2021, aimed to curb NSO Group’s alleged misuse of its Pegasus spyware on Apple devices. However, citing security concerns related to its own cyber defense capabilities, Apple has chosen to withdraw from the legal battle.

Common security testing approaches leave gaps. Here's how to find them.

Gaps in your security testing program are likely more than simply missed assets. Infrequent testing and even low test accuracy are also gaps, and can be just as bad or worse. Gaps happen despite the best efforts of everyone involved. The good news is that, with some strategic adjustments, you can reduce gaps using tools you likely already have deployed.