Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

MitM Attacks: Understanding the Risks and Prevention Strategies

As our interactions with the digital world grow, connections will be established within seconds, leading to more online attacks. One type of attack we may be exposed to is known as a Man-in-the-Middle (MitM) — a technique cyber attackers use to take over our online communications. The best way to stay safe online is with a better understanding of the problems caused by these digital attacks and identification of the dangers and consequences they entail.

Password Management for Healthcare Professionals

Password management in the healthcare industry is essential for maintaining the privacy of patient and employee information. HealthITSecurity reports that in just the first three months of 2024, there were over 115 data breaches in the healthcare industry. One of the most recent and largest data breaches in healthcare impacted over 2.3 million patients of Medical Management Resource Group at the end of 2023.

The Road to Resilience: Establishing a Minimum Viable Business through Rubrik Security Cloud

In the fast-paced and interconnected world of business, the continuity of operations after a cyber attack is paramount. Many companies today are embracing the concepts of Minimum Viable Business/Company (MVB/C) as a key strategy in ensuring that their core business applications and processes are able to survive in the face of adversity.

Fueling Business Growth With a Seamless Google Cloud migration

In today’s hybrid office environments, it can be difficult to know where your most valuable and sensitive content is, who’s accessing it, and how people are using it. That’s why Egnyte focuses on making it simple for IT teams to manage and control a full spectrum of content risks, from accidental data deletion to privacy compliance.

New Linux Variant of Play Ransomware Targeting VMware ESXi Systems

In a recent development, cybersecurity researchers have identified a new Linux variant of the notorious Play ransomware, also known as Balloonfly and PlayCrypt. This variant specifically targets VMware ESXi environments, signaling a strategic expansion by the threat actors behind it. Trend Micro's report published on Friday highlights the potential for a broader victim pool and more effective ransom negotiations as a result of this evolution.

The Divine SASE Touch

The Paris Olympics are coming up, arousing excitement and anticipation around the globe. As the world’s greatest athletes prepare to compete on this renowned stage, let’s shift our focus to a few of the earliest Olympics competitors – the Greek Gods. These deities, myth says, competed in the ancient Olympics, and later on, the Games were held in their honor. To this day, the Olympics are a global festival of what the Gods symbolized – strength, resilience and elegance.

Phishing Attacks Will Likely Follow Last Week's Global IT Outage

Organizations should expect to see phishing attacks exploiting the global IT outage that occurred last Friday, the Business Post reports. I recently wrote my thoughts about the outage that was caused by a faulty CrowdStrike update that was extremely disruptive globally. The outage was caused by a faulty CrowdStrike update that crashed Windows systems, disrupting airlines, banks, hospitals, governments, and businesses around the world.

Threat Actor Uses Fake CrowdStrike Recovery Manual to Deliver Unidentified Stealer

On July 22, 2024, CrowdStrike Intelligence identified a Word document containing macros that download an unidentified stealer now tracked as Daolpu. The document impersonates a Microsoft recovery manual.1 Initial analysis suggests the activity is likely criminal.