Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Add to Chrome? - Part 1: An Analysis of Chrome Browser Extension Security

Welcome to the wonderful world of browser extensions! These tools promise efficiency, entertainment, and customization at your fingertips. But could those promises come with any hidden danger? In this blog series, we provide an overview of SURGe research that analyzed the entire corpus of public browser extensions available on the Google Chrome Web Store. Our goal? To unravel whether these extensions facilitate a better browsing experience or represent potential threats lurking in plain sight.

ISO 27002: Information Security Controls Explained

In the race to execute digital transformation strategies, the rear-view mirror never fails to shake off the looming cyber threats that are a significant stumbling block to any organizational objectives. Today, nearly 48% of organizations are experiencing more cyberattacks than the previous year.

Credit Union Struggles Following Ransomware; SSNs of 61k Stolen

The Bayer Heritage Federal Credit Union has headquarters in West Virginia. Like other unions, they offer various services that assist members in saving and investing no matter their life phase. Bayer’s products include financial accounts, IRAs, investment options, and many loans, from estate to student. At the end of October 2023, Bayer reportedly experienced a cyberattack; the breach lasted only a day but exposed the Social Security Numbers (SSNs) of 61,159 borrowers.

Weekly Cybersecurity Recap February 9

This week, around 643k data records were announced as lost in the cyber wars. Early on, the public learned of HopSkipDrive’s event, which impacted 155k student guardians. The most significant breach of this week, with an impact figure of over 307k, also occurred early in the week; the Des Moines Orthopaedic Surgeon clinic claimed the incident was due to a vendor’s failure.

How to Create a Zero Trust Network

Organizations no longer keep their data in one centralized location. Users and assets responsible for processing data may be located outside the network, and may share information with third-party vendors who are themselves removed from those external networks. The Zero Trust approach addresses this situation by treating every user, asset, and application as a potential attack vector whether it is authenticated or not.

How Nucleus Security's $43M Series B Funding Powers Enterprise Risk-Based Vulnerability Management Innovation

We at Nucleus Security are thrilled to share our journey and vision following our recent $43 million Series B funding round. This investment, led by Arthur Ventures and Lead Edge Capital, is a testament to our commitment to leading the charge in vulnerability management innovation and our dedication to protecting digital infrastructures worldwide. Read the full press release here.

Ransomware attacks cost companies millions in 2023

Ranging from the process of recovering stolen data to having to hire legal services, a cyberattack generates a series of costs that companies have to face. According to an IBM report, the global average cost of a data breach reached $4.45 million in 2023, which represents an increase of 15% in three years. This seven-digit figure is clearly worrying.

Network Security Threats & Solutions for Cybersecurity Leaders

Modern organizations face a wide and constantly changing range of network security threats, and security leaders must constantly update their security posture against them. As threat actors change their tactics, techniques, and procedures, exploit new vulnerabilities, and deploy new technologies to support their activities — it’s up to security teams to respond by equipping themselves with solutions that address the latest threats.