Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Why Offensive Security is a Necessity for a Dynamic Threat Landscape

Today's ever-shifting threat landscape demands a multi-pronged approach to cybersecurity. Organizations must go beyond mere compliance by employing a combination of offensive security tactics and frequent testing. This empowers them to effectively manage organizational exposure and protect critical assets from evolving threats such as ransomware.

March Release Rollup: "Ask AI" on Desktop and Mobile App, Geo Location Search, Egnyte for Salesforce - Metadata for Folders and More

This month's product updates and enhancements rollup includes “Ask AI” on Desktop and Mobile App, Geo Location Search, and Egnyte for Salesforce – Metadata for Folders. Below is a summary of these and other new releases. Visit the articles linked below for more details.

Celebrating 1,000 reviews on G2 and our first-ever Customer Week

Everything we do at Vanta, from the products we build to the support we deliver, is focused on putting customers first. So we’re especially excited to share our latest customer milestone. ‍ We’ve crossed 1,000 reviews on G2 and for the sixth consecutive quarter, Vanta has been named the #1 Leader in G2’s Grid® Report for Security Compliance | Spring 2024.

Narwhal Spider Threat Group Behind New Phishing Campaign Impersonating Reputable Law Firms

Using little more than a well-known business name and a invoice-related PDF, the “NaurLegal” phishing campaign aims at installing malware trojans. This new campaign spotted by security analysts at BlueVoyant demonstrates how effective spear phishing can be — even when the phishing execution itself is relatively basic. According to the analysis, threat actors impersonate well-known law firms and send out PDF attachments with the filename "Invoice_.pdf." Simple enough, right?

Does a VPN Protect You From Hackers?

While VPNs may protect you from some types of cyber attacks launched by hackers, they don’t protect you from all of them. For example, VPNs may protect you from Man-in-the-Middle (MITM) attacks, remote hacking, Distributed Denial-of-Service (DDoS) attacks and session hijacking, but VPNs will not protect you from hackers who steal encryption keys, or from account compromise, phishing attacks or illegitimate websites.

New Malware Loader Delivers Agent Tesla Remote Access Trojan Via Phishing

A new malware loader is delivering the Agent Tesla remote access Trojan (RAT), according to researchers at Trustwave SpiderLabs. The malware is distributed by phishing emails with malicious attachments. “The threat begins with a fake bank payment email designed to deceive recipients,” the researchers write.

Common Disaster Recovery Mistakes To Avoid

In a world driven by data, the importance of disaster recovery solutions cannot be overstated. From natural disasters to cyberattacks and human errors, the risks of data loss continues to grow alongside businesses. Today, we will cover the 3 common mistakes companies make when creating a DR strategy, key steps for building an effective DR strategy for your business, and the ways Opti9 can protect your data in AWS.