Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Navigating the threat landscape of LockBit

Imagine a virtual phantom slipping through digital shadows, silently locking away data, and leaving a haunting message demanding a ransom. That is LockBit ransomware, the stealthy troublemaker in the world of cybersecurity. In this blog, let’s unpack the mysteries of LockBit: how it sneaks in and wreaks havoc and why businesses should be on high alert.

How To Automate Incident Response with SentinelOne and Torq

One of the superpowers of the Torq Hyperautomation platform is the ability to integrate with anything. We team up with leading security vendors to combine forces to create automations that make SOC analysts’ lives easier while also improving their organizations’ security posture. In this post, we’ll talk about how the enterprise-grade Torq Hyperautomation platform integrates with SentinelOne to level up your organization’s SOC workflows with autonomous incident response.

Russian State-Sponsored Threat Actor Targets High Profile Individuals in Phishing Campaign

The Russian state-sponsored threat actor “COLDRIVER” is launching phishing campaigns against “high profile individuals in NGOs, former intelligence and military officers, and NATO governments,” according to researchers at Google’s Threat Analysis Group (TAG). “COLDRIVER continues its focus on credential phishing against Ukraine, NATO countries, academic institutions and NGOs,” TAG says.

AI Does Not Scare Me, But It Will Make The Problem Of Social Engineering Much Worse

I am not scared of AI. What I mean is that I do not think AI is going to kill humanity Terminator-style. I think AI is going to be responsible for more cybercrime and more realistic phishing messages, but it is already pretty bad. Social engineering, without AI, is already involved in 70% - 90% of successful cyber attacks.

Facebook Phishing Scams Target Concerned Friends and Family

BleepingComputer describes a phishing scam that’s been running rampant on Facebook for the past several months, in which threat actors use hacked accounts to post links to phony articles implying that someone has been killed in an accident. The Facebook posts have captions like “I can't believe he is gone,” accompanied by thumbnails of news articles involving car accidents or crime scenes.

Employment Verification & Background Verification Process - What's new

Background verification involves gathering details about a candidate’s work history, criminal record, academic qualifications, and proof of residence. This step is critical in the lengthy and intricate process of hiring and onboarding. It means that applicants might experience a delay as employers thoroughly review their employment backgrounds. The transition from completing background checks to reaching a “good to hire” decision usually spans 3-5 days.

Ensuring Confidence: A Guide to Identity Verification in Sharing Platforms

In the ever-evolving landscape of the sharing economy, where trust is the currency and safety is paramount, the decision to rent a room in a stranger’s home or rely on someone you’ve never met for a ride home is not taken lightly. The success of companies in this dynamic sector hinges on their ability to establish and maintain trust and safety.

FaceMatch: Exploring the Role of AI in Age Verification vs Age Gating

In the vast landscape of the internet, where information and services flow freely, the need to protect minors from age-restricted content has become more critical than ever. With the rise of online platforms dealing in alcohol, gambling, and adult-themed material, the battle between age verification and age gating has taken centre stage.

How Essential are Identity Verification Services for Employment Screening Providers?

In today’s digital age, marked by advanced artificial intelligence and a heightened risk of identity fraud, the authenticity of individual identities has become a cornerstone concern for businesses. This challenge is acutely felt in the realm of employment screening, where the verification of candidate identities is not just a procedural step but a crucial safeguard in the integrity of the hiring process.

Student Attendance Management: How Biometric Attendance System works

In today’s educational landscape, the integration of technology has fundamentally altered the way institution’s function. Among the plethora of technological advancements, the implementation of Student Attendance Management Systems has stood out as a game-changer. These systems, often referred to as online attendance management systems or attendance automation systems, have reshaped the traditional approach to attendance tracking in educational settings.