Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How Cybercriminals Use Breaking News for Phishing Attacks

Trustwave SpiderLabs issued a warning that threat actors may attempt to take advantage of CrowdStrike’s software update that caused widespread outages by using the news as the center of a social engineering scheme to convince people to open malicious phishing emails or fall for other types of attacks. Using this news cycle is nothing new.

Navigating Cybersecurity Requirements Under the Dodd-Frank Act

Over the last decade, cybersecurity has emerged as a critical concern for financial institutions. With cyberattacks increasing in frequency and sophistication, it has become imperative for institutions in the financial sector to safeguard sensitive data and implement robust data protection measures. The Dodd-Frank Wall Street Reform and Consumer Protection Act, commonly known as the Dodd-Frank Act, plays a crucial role in regulating the American financial services industry.

What is a Brute Force Attack in Cybersecurity and How to Prevent it

In the world today, there is a plethora of critical data circulating the internet, leading to complex attacks like brute force attacks. Individuals who are after this data for the wrong purpose and who use brute force attacks to gain access to these data are called cyber attackers.

How to Protect Your Business from Data Leaks

Friday, Jul 19th, 2024 In this blog, we're going to discuss how you can protect your business from data leaks that can result from insecure application programming interfaces. Cloud native applications are composed of loosely coupled microservices, which are predominantly intercommunicating via APIs.

Were Your Passwords Leaked in RockYou2024? Here's What To Do.

If your passwords were exposed in the RockYou2024 leak, you should immediately change them, set up Multi-Factor Authorization on your account and monitor your account for suspicious activity. RockYou2024 is now the largest password leak to date, with almost 10 billion passwords revealed on a popular hacking forum. Due to the magnitude of this leak, many people around the world are concerned for their online safety.

CrowdStrike Windows Outage

Across the world, Windows computers have by effected the dreaded Blue Screen of Death (BSOD). This appears to have been caused by an outage of services provided by cyber security provider, CrowdStrike, and has impacted a large number of organisations – from banks to airlines. According to recent announcements, “CrowdStrike is actively working with customers impacted by a defect found in a single content update for Windows hosts,” CrowdStrike CEO George Kurtz said on X.

Should I Use ChatGPT to Create Passwords?

No, you should not use ChatGPT to create passwords because it will likely produce the same password for multiple users and what you input will live on in its database. For those of you who are unfamiliar with what ChatGPT is and does, it is an Artificial Intelligence (AI) program used to follow instructions through prompts and provide a user with answers to both simple and complex questions.

Preparing for Cybersecurity Audits: Insights from US Regulations

Cybersecurity regulations often include audits that assess and strengthen an organization’s defenses against increasing cyber threats. In the United States, various cybersecurity regulations, including HIPAA, SOX, PCI DSS, and more, require audits. Each audit ensures your organization meets the required standards outlined in the regulation while also strengthening its overall cybersecurity framework.

Privacy vs. Mobile Security: Why MSPs Don't Have to Choose

When it comes to how employees get work done, personal devices are an ever-growing part of the equation. The 2023 Lookout State of Remote Work Security Report found that 92% of remote workers have performed work tasks on their personal mobile devices. While putting security controls on employer-owned devices is a no-brainer, the increasing overlap of personal with professional means that organizations need to think about how to secure employee-owned devices that are being used for work.