Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Volcano Demon Ransomware Group Uses Phone Calls for Direct Extortion

A newly identified ransomware group, "Volcano Demon," has emerged, targeting executives directly with threatening phone calls instead of the typical data leak sites. Over the past two weeks, this group has carried out several attacks, deploying a unique ransomware variant known as “LukaLocker,” according to a report from Halcyon. LukaLocker Ransomware Attack Overview Volcano Demon’s ransomware, LukaLocker, encrypts files with a.nba extension.

If I Click a Link, Will I Get Hacked?

If you click on a malicious link, also known as a phishing link, there is a possibility that you’ll get hacked. This is because clicking on a phishing link could immediately cause malware to download on your device. Alternatively, clicking on a link can direct you to a dangerous phishing website where you’re prompted to enter your personal information. Continue reading to learn more about how clicking a link can lead to getting hacked and how to avoid clicking on these malicious links.

Twilio's Authy App Breach: Millions of Phone Numbers Exposed

Twilio, the cloud communications provider, has disclosed a security breach affecting its Authy app, exposing users' phone numbers due to an exploit in an unauthenticated endpoint. Understanding the Authy App Breach Twilio confirmed unauthorized access to an endpoint within Authy, leading to the exposure of data linked to Authy accounts, specifically users' cell phone numbers.

Egnyte Now Available On Google Cloud Marketplace

In a world where collaboration and efficiency are at the forefront, Egnyte’s partnership with Google Cloud is transforming the way work happens for businesses. We know that many of our customers are also Google Cloud and Workspace customers and that one can simplify procurement cycles and maximize technology investments through Google Cloud. That’s why, starting today, Egnyte is available on Google Cloud Marketplace! Let us break down how this all works.

Protegrity Helps AWS Customers Attain Compliance for Data Security

A large solutions and services company facing strict compliance regulations and enforcements needed a powerful, scalable enterprise data protection solution for their data being migrated over to S3, Athena, Amazon Redshift, and Glue environments. The sensitive data included HR, Financial and customer information. Using Protegrity’s field-level data protection, the company overcame this challenge, significantly improving their processes.

Password Policy Configuration for Safer Security

A password policy is a set of rules that are usually a part of an organizations security regulations to improve computer security. These policies can be formal regulations or part of security awareness training programs that outline requirements such as minimum length, complexity and unique characters. A password must comply with these password strength rules to be set for an account.

Don't Fall for It: How to Spot Social Media Job Scams a Mile Away

As social media becomes more intertwined with our daily routines, cybercriminals are using it to trick people with fake job offers. What are these social-media recruitment scams, and how can you spot the red flags? With unemployment surging in many countries around the world, in particular countries like South Africa, which is currently at the top of the highest unemployment list in the world at over 32%, it’s no wonder that scams targeting job seekers are becoming more common.