Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

10 Cybercrimes Against Colleges and K-12 Schools, and How To Prevent Them

K-12 schools, colleges, and universities store massive amounts of personal information for students, parents, and employees. This means that, while they may not make the news as much as other breaches, schools, colleges, and universities are under constant attack by modern threat actors.

Uncovering the Dirty Secret of Open-Source Code and Its Risks for Organizations

Using open-source code exposes organizations to a tremendous amount of risk, yet this point is treated like a dirty little secret that nobody talks about. So, let’s live on the edge and take a minute to talk about the problem. Open-source code is an oddity. Generally, open-source code is often placed in small packets tucked inside massive programs that corporations use to run their most important processes or it is adopted as a whole program and tasked with running some part of a business.

All About That 8Base Ransomware Group: The Details

First Publishied Nov 6th 2023 Updated May 9th 2024 Last seen on this month, 8Base is a ransomware collective that initiated its operations in April 2022. Despite its relatively short time in the cyber landscape, the group has swiftly garnered a reputation for its forceful strategies and the substantial volume of victims it has affected.

Mobility Made Simple: Exploring the AWS Snow Family

The AWS Snow Family is a service offering designed to assist customers in leveraging Amazon Web Services (AWS) closer to where their data is generated, primarily in sites where internet connection may not be viable. When used, clients can run applications with minimal delay and comply with data storage location requirements. The Snow Family includes Snowball Edge and Snowcone, which are designed for two main purposes: running applications in harsh conditions and moving data from remote places to AWS.

Elastic integrates Anthropic's Claude 3 models to enhance AI-driven security analytics

For security analysts navigating an increasingly complex threat landscape, the ability to quickly identify and respond to attacks is critical. Security information and event management (SIEM) tools have been integral to helping security teams quickly respond to attacks. Now, in the era of generative AI, Elastic is changing the game by delivering AI-driven security analytics to replace SIEM and modernize the SOC.

How to Use Git Secrets for Better Code Security

You know that sinking feeling after you hit “commit”? That moment when you suddenly wonder, “Wait, did I just accidentally expose an API key or hardcode a password?” We’ve all been there, and the risks are no joke. But here’s the good news—there’s a way to ditch that anxiety for good. In 2023, GitHub’s automated scanning blocked over 12.8 million leaked secrets. Code leaks are every developer’s worst nightmare.

Common Scams on Facebook Marketplace by Fake Buyers

Facebook (FB) is the most popular social platform worldwide, hosting 2.9 billion monthly active users. The draw to FB comes from its social connectivity, allowing friends and family to stay connected, updated, and in each other’s lives, no matter where they are. Facebook’s success is also due, in part, to its platform services. The Facebook Marketplace is among the most used, with nearly 16% of active users (491 million people) using the platform to review the available items.

The 2024 Cybersecurity Excellence Awards Recognizes archTIS Products as Winners in Data-centric Security and National Cyber Defense

archTIS is excited to share that the company has been honored with two significant awards in the 2024 Cybersecurity Excellence Awards. Our products, Kojensi and NC Protect, have been recognized in the National Cyber Defense and Data-centric Security categories. We are proud to be acknowledged by the Cybersecurity Excellence Award judges for our commitment to excellence, innovation, and leadership in cybersecurity.

The Human Element of Email Security: Understanding Behavioral Threats and Social Engineering

Behavioral threats and social engineering attacks target the human psyche rather than exploiting technical vulnerabilities. They rely on psychological manipulation, deception, and exploiting human trust to trick individuals into divulging sensitive information, clicking on malicious links, or taking actions that compromise security. Understanding these tactics and the human behaviors they exploit is key to effectively mitigating email security risks.

AI Voice Cloning: The New Frontier for Cybercriminal Fraud and How to Protect Yourself

Many members of the younger generations avoid answering phone calls. On the one hand, this avoidance may be personal, as voice calls can sometimes cause anxiety; however, there is more to these rejections than nervousness. In our ever-evolving world, threat actors are always looking for a new way to manipulate and steal from their victims—and phone calls have become a strange, new frontier for cybercriminal fraud, unlike anything the world has seen before.