Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Ensure IP forwarding is disabled a RHEL Benchmark

IP forwarding in Linux is a feature that allows a system to route packets between network interfaces, effectively functioning as a router. While this capability is essential for specific network setups, it poses security risks if enabled unnecessarily. Disabling IP forwarding is a critical step in server hardening, particularly for systems not intended to perform routing tasks.

Top 10 Software Composition Analysis (SCA) tools in 2025

85% of the code that we use doesn’t come from our own code, it comes from our open-source components and dependencies. This means attackers can know your code better than you do! SCA tools are our best line of defense to keep our open-source supply chain secure. Software Composition Analysis (SCA) tools, also known as open-source dependency scanning, help us understand the risks we have in our open-source supply chain.

Reflections on 2024: Building what truly matters at Appknox

As 2024 draws to a close, I’m reflecting on a year that has been nothing short of transformative for Appknox. This was a year of bold ideas, breakthrough innovation, and meaningful partnerships. It was a year where we didn’t just meet expectations—we redefined them. In many ways, 2024 was about going back to the fundamentals of why we exist: to make mobile application security simple, scalable, and effective.

BDRSuite Roadmap 2025: A Glimpse into the Future of Backup & Recovery

The year 2025 marks an exciting chapter for BDRSuite as we unveil a roadmap dedicated to empowering Managed Service Providers (MSPs). With a strong emphasis on Remote Centralized Management, we aim to redefine the managed backup experience for MSPs. Additionally, our roadmap introduces new features and enhancements focusing on ransomware protection, virtual environments (Proxmox VE, oVirt, KVM) and latest security updates, addressing evolving market demands and user needs.

Simplifying Backup and Recovery for VMware Tanzu Kubernetes with CloudCasa

In the modern Kubernetes ecosystem, VMware Tanzu has emerged as a popular platform for enterprises deploying containerized workloads. To meet Tanzu Backup and disaster recovery needs, Tanzu relies on Velero, an open-source solution, for backing up and restoring cluster resources and persistent volumes.

Space Bears Ransomware: What You Need To Know

Space Bear is a relatively new ransomware group that first appeared on the radar in April 2024. The gang, which is aligned to the Phobos ransomware-as-a-service group, steals sensitive data from organisations, encrypts victims' computer systems, and demands that a ransom be paid for a decryption key or the data will be published on the dark web.

The State of Magecart: A Persistent Threat to E-Commerce Security

Trustwave SpiderLabs first blogged about Magecart back in 2019; fast forward five years and it is still here going strong. During the pre-holiday season, cybercriminals ramped up their efforts to target e-commerce websites, aiming to steal cardholder and personal information. These attacks, collectively known as Magecart, have been active since 2015, named after the Magento e-commerce platform with "cart" referencing shopping carts — their initial primary targets.

What Does Cyber Insurance Cover? Does It Cover GDPR Fines?

Cyber insurance, also referred to as cyber liability insurance, is a specialized insurance product designed to help businesses mitigate financial losses resulting from cyber threats. In today’s digital landscape, cyber risks such as ransomware attacks, malware infections, and data breaches can lead to severe financial and operational damage.

How Computer Forensic Services Enhance the Accuracy of Legal Investigations

We all know that everything is online nowadays. From texts and emails to documents and images - it is all digital. So, when something goes wrong, like a crime or a dispute - you can bet that a lot of the evidence will be digital, too. That is where computer forensic services come in. These services dig through computers, phones - and other devices to find hidden evidence that might not be obvious at first glance. But how exactly do they help with legal investigations? Let's take a look.