Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Take Me Down to Funksec Town: Funksec Ransomware DLS Emergence

Cyjax has continued to observe the emergence of data-leak sites (DLSs) for extortion and ransomware groups, with ContFR, Argonauts, Kairos, Chort, and Termite, appearing November 2024 alone. Cyjax has identified the emergence of a Tor-based DLS belonging to a new, self-called “cybercrime group” named ‘Funksec’. This group has claimed 11 victims so far and advertises a free Distributed Denial-of-Service (DDoS) tool.

Achieve Enhanced Risk Visibility With Keeper's Risk Management Dashboard

Keeper Security’s Risk Management Dashboard delivers a streamlined view within the Keeper Admin Console to quickly and easily give administrators visibility into their organization’s Keeper configuration practices and compliance posture. The Risk Management Dashboard leverages an outlined set of Keeper Security Benchmarks to keep organizations compliant and safe.

2024 Open Source Security Report: Slowing Progress and New Challenges for DevSecOps

Trust is the foundation of the open source community — but what happens when that trust is betrayed? When a backdoor vulnerability was found in a widespread Linux-based data compression tool, it nearly created an opportunity for malicious actors to seize control of countless computers worldwide. The vulnerability was introduced by a trusted contributor who, after years of building rapport with maintainers, ultimately exploited that trust.

Forget Mono Repo vs. Multi Repo - Building Centralized Git Workflows in Python

This blog article summarizes a talk given by David Melamed, Jit CTO, at Pycon DE & PyData 2022 in Berlin. In every software development project, before even writing the first line of code, you gotta pick an architecture for your repo. Picking an architecture is not easy. There are many tradeoffs that need to be considered and this choice will impact future development.

We Just Reduced our Security Scan Times by 80%

The success of any application or cloud security initiative depends on developer buy-in, so they can fix vulnerabilities before arriving in production. So why can it be challenging to empower developers to secure their code early? The answer is simple: security is usually slow. Developers are motivated to deliver innovative features faster than their competitors, so introducing new processes into the CI/CD pipeline that slow them down could understandably be met with resistance.

5 Secrets of a SOC Leader Turned Field CISO

Torq is thrilled to have Patrick Orzechowski (also known as “PO”) on board as our new Field CISO, bringing his expertise and years of experience as a SOC leader to our customers. PO is a seasoned security veteran with a deep understanding of the modern security landscape. By way of introduction, below he shares his five top pieces of advice for SOC leaders facing today’s security challenges.

NDR in the Era of Cloud and Hybrid Environments: Why It's Essential

With cloud infrastructures expanding across private, public, hybrid, and multi-cloud models, effective security monitoring is essential. Gartner’s 2024 Hype Cycle for Workload and Network Security suggests that NDR solutions are becoming critical in these diverse environments and could reach widespread adoption within the next two to five years. This trend underscores the importance of NDR for visibility and rapid threat detection in today’s complex cloud landscapes (see Figure 1).

Hellcat Ransomware: A Growing Threat to Businesses and Organizations

Hellcat ransomware emerged in early November 2024 and quickly became a notable threat in the cybersecurity landscape. The group first gained attention on November 6, 2024, when it claimed responsibility for a cyberattack against Schneider Electric. Known for its aggressive tactics and unique ransom demands, Hellcat is already making its mark in the world of ransomware.

Seven steps to close coverage gaps with ASPM

The old adage “knowledge is power” holds especially true in the realm of AppSec. By remaining aware of the potential threats to applications and closing gaps in coverage, AppSec teams can demonstrate to leaders that they are in a solid position to protect vital assets. However, visibility is riddled with challenges, not the least of which are highly productive developers racing to market, often using AI-generated code that contains potential security issues.