Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Navigating NIS2 Requirements: Transforming Supply Chain Security

Talking to fellow CISO’s around the globe - and in particular Europe - the topic of cybersecurity regulations and compliance has taken on a new life. Most recently, the Network and Information Security (NIS 2) Directive is the latest regulation shaking up the region. NIS2 is much more than an update though—it's transforming the cybersecurity landscape of the EU.

Call for action: Exploring vulnerabilities in Github Actions

To address the need for streamlined code changes and rapid feature delivery, CI/CD solutions have become essential. Among these solutions, GitHub Actions, launched in 2018, has quickly garnered significant attention from the security community. Notable findings have been published by companies like Cycode and Praetorian and security researchers such as Teddy Katz and Adnan Khan.

Security Posture Drift: Tracking & Managing Security Posture Over Time

Given the high level of complexity in securing enterprise IT systems, it can be extremely difficult to keep track of changes in the organization’s overall security posture. It’s even more complicated to ensure that the dozens of security controls in place to protect the organization’s IT (and OT) assets are functioning properly and configured securely.

Surge in CatDDoS Attacks: Exploiting Vulnerabilities to Spread Mirai Variant

The cybersecurity landscape has recently been shaken by a surge in activity involving a Mirai distributed denial-of-service (DDoS) botnet variant known as CatDDoS. Over the past three months, threat actors have aggressively exploited more than 80 vulnerabilities to spread this malware. In this blog, we explore the recent CatDDoS attacks, the targeted sectors, and the implications for cybersecurity practices.

A Guide to Vendor Risk Management Reporting in 2024

Vendor Risk Management encompasses a wide range of cybersecurity risk factors. As such, a VRM report design could range from highly detailed to concise, depending on the specific reporting requirements of stakeholders and the board. This list represents the most comprehensive scope of third-party risk management information to fit the broadest range of VRM reporting use cases.

Beyond IT: The Organization-Wide Benefits of Password Managers

Government IT managers are tasked with an ever-growing list of responsibilities, from IT infrastructure to operations, equipment, systems administration and security. IT teams are also directly responsible for protecting sensitive government information, including Personally Identifiable Information (PII) like names, addresses, driver’s license numbers, forms of payment, Social Security numbers and financial records.

Emerging Threat: Attackers Target Check Point VPNs to Breach Corporate Networks

In the ever-evolving landscape of cybersecurity, the tools designed to protect us can sometimes become our greatest vulnerabilities. This paradox is becoming evident as attackers increasingly target Check Point VPNs, exploiting them to gain initial access to corporate networks. Recent findings highlight a growing trend where cybercriminals are leveraging vulnerabilities in remote access VPNs, posing a significant risk to organizational security.

Hit by LockBit? The FBI is waiting to help you with over 7,000 decryption keys

Did your company fall victim to the LockBit ransomware? Have cybercriminals left gigabytes of your data encrypted, with no easy route for recovery that doesn't involve paying a ransom? Well, don't fear. The FBI announced this week that it had obtained over 7,000 decryption keys for the LockBit ransomware and is urging victims to come forward for free assistance.

Internxt vs Google Drive: How to Protect Your Files from Google

Have you ever really asked yourself why you’re using Google Drive? Sure, they give you a generous amount of free storage and other features, but at what cost? The privacy of your files. Signing up for Google Drive may seem like a good product to help you store your files online, but Google holds all the power when it comes to: As we live in an era centered around technology, the risks to our data increase.