Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Can Someone Hack My Home WiFi?

Yes, it is possible for someone to hack your home WiFi. This can occur if you have a weak WiFi password, if you fail to update your router’s software or through a method called Domain Name Server (DNS) hijacking. Continue reading to learn how your home WiFi can be compromised, the signs of a hacked WiFi router, the steps to take if you get hacked and effective measures to prevent your home WiFi from getting hacked.

Not Just Us: North Korean Remote IT Fraudster Arrested in Tennessee

Just when we thought we had something special with our very own North Korean hacker, it turns out this type of fraud has made it to the Volunteer State. A recent arrest in Nashville, Tennessee is just another example of this global tactic finding its way into U.S. organizations. Fortunately, the authorities caught up with this one. According to the tech news site Cyberscoop, authorities arrested a 38-year-old man for allegedly getting himself hired by U.S. and British companies under false identities.

Exploring the dynamic landscape of cybersecurity threats

Hello, My name is Chen, and I work as a threat intelligence analyst at Salt Security. Every day, I dive into the complex world of cybersecurity, uncovering the hidden threats that hide in our digital lives. Today, I'd like to take you on a journey through the evolving landscape of API threats. APIs are the quiet helpers of the digital world, allowing software applications to communicate easily with each other.

Secure Password Policies for Active Directory: A Comprehensive Guide

One of the most common ways for attackers to slip into a corporate network is by compromising the username and password of a legitimate user account. Usernames are typically trivial to guess because they follow an established standard in a given organization, such as FirstnameLastname@domain.com. Unfortunately, compromising basic passwords is also surprisingly easy for threat actors today. For example, they can run a program that tries out various potential passwords for a particular user account.

Summer 2024 Product Release: What's New at Astra Security?

Cybersecurity has evolved from a technical challenge to a strategic business imperative. CXOs now grapple with a complex interplay of technological advancements, organizational shifts, and human error, which is only intensified by Generative AI, insider threats, third-party vulnerabilities, and persistent threat exposure.

Why Your eTMF Vendor Doesn't Want You To Know About The Exchange Mechanism Standard

Traditionally, TMFs were immense paper files amassing all the required information and evidence for future audit. The manual collation of data and resources was time-consuming and prone to human error. Paper filing is difficult at scale, especially when some trails last more than a decade. To alleviate these issues, companies began storing their Trial Master Files in electronic formats about 14 years ago.

Tech Analysis: CrowdStrike's Kernel Access and Security Architecture

In today’s rapidly evolving threat landscape, the need for dynamic security measures is critical. Due to Windows’s current architecture and design, security products running in the platform, particularly those involved in endpoint protection, require kernel access to provide the highest level of visibility, enforcement and tamper-resistance, while meeting the strict performance envelopes demanded by large enterprise clients.

Balancing Escalating Security Concerns While Pursuing Business Innovation

Australia's business leaders face a complex and rapidly evolving market landscape that is highly competitive, globally interconnected, and demands a proactive approach to risk management. As continued technological innovation drives business development, efficiency, and success, it simultaneously empowers malicious threat actors to evolve and attack successful businesses more sophisticatedly.