Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Virtual Machine Backup Software: A Guide to Data Protection

Virtual machines form the backbone of most enterprise IT systems, which means effective virtual machine backup software is essential for safeguarding business operations. Companies need reliable backup solutions to protect their virtualized applications and data from unexpected failures, breaches, or system crashes.

The Results Are In: Cybersecurity Automation Is Crucial

Cybersecurity automation is no longer a “nice-to-have” — it’s a necessary component for security teams. The latest data reveals that organizations are increasingly recognizing the critical role automation plays in safeguarding their systems and enabling their teams to thrive. Here are the key insights.

How to mitigate SSRF vulnerabilities in Go

Securing HTTP requests is crucial when developing Go applications to prevent vulnerabilities like Server-Side Request Forgery (SSRF). SSRF occurs when an attacker manipulates a server to make unintended requests, potentially accessing internal services or sensitive data. We will explore how to secure HTTP requests by employing URL parsing and validation techniques, and provide example code to fortify the http.Get HTTP GET request handler.

Cato Networks Expands Platform to Deliver the Industry's First SASE-native IoT/OT Security Solution

Today, Cato Networks introduced Cato IoT/OT Security, the industry’s first SASE-native IoT/OT security solution. Cato IoT/OT Security extends SASE-based protection into IoT/OT environments, improving visibility and security while reducing complexity. Cato IoT/OT Security is a native feature in the Cato SASE Cloud Platform. It allows enterprises to instantly activate the new solution with a click of a button. No additional hardware or software needs to be installed or configured.

The Future of CMMC Compliance

Since its initial release in January 2020, the Cybersecurity Maturity Model Certification (CMMC) has undergone a series of fundamental changes. Fortunately, CMMC compliance requirements became much clearer when the US Department of Defense (DoD) published its CMMC Final Rule in October 2024. As a result, CMMC will have an impact on nearly every DoD contractor and subcontractor, and it’s anticipated that references to CMMC will be included in DoD contracts as early as March 2025.

Phishing Holds the Top Spot as the Primary Entry Point for Ransomware Attacks

New analysis of ransomware attacks shows that phishing is the primary delivery method and organizations need to offer more effective security awareness training to mitigate the threat. Hornet Security’s Q3 2024 Ransomware Attacks Survey report paints a pretty bleak picture of how organizations have fared this year against ransomware attacks. So almost one in five organizations is a victim. According to the survey data, 52.3% of the attacks started with a phishing email.

Phishing Attacks Are Now Leveraging Google Ads to Hijack Employee Payments

Researchers at Silent Push warn that a phishing campaign is using malicious Google Ads to conduct payroll redirect scams. The attackers are buying search ads with brand keywords to boost their phishing pages to the top of the search results. “We have identified hundreds of domains primarily focused on Workday users and high-profile organizations, including the California Employment Development Department (EDD), Kaiser Permanente, Macy’s, New York Life, and Roche,” the researchers write.

Turning Security Insights into Action with Bitsight's New Jira Integration

Enterprise security is a job that is never truly done. Success comes down to prioritizing high-impact activities, executing them efficiently, and adapting as new information emerges. Bitsight Security Performance Management (SPM) is the centerpiece of this lifecycle for many organizations. It helps security teams understand their external attack surface in detail and make data-driven decisions about how to apply their limited resources most effectively.