Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Fight Phishing Fatigue: How Torq Hyperautomation Simplifies Phishing Analysis

2023 went down in history as the worst year for phishing attacks on record, with nearly 35 million attempted business email compromise (BEC) attacks detected and investigated, according to the Microsoft Threat Intelligence Cyber Signals report. Unfortunately, phishing analysis is one of the most time-consuming tasks for the SOC. Responding to a phishing incident requires careful examination.

Dell Data Breach: Hackers Expose Personal Info of 49M Customers for Sale

Dell Data Breach: What You Need to Know? Dell Technologies recently announced a data breach affecting a company portal, which compromised certain customer information linked to purchases. The breach exposed customer names, physical addresses, and detailed order information, such as service tags, item descriptions, order dates, and warranty details. Fortunately, Dell has assured that no financial data, email addresses, phone numbers, or other highly sensitive information were accessed during the incident.

CIO POV: Navigating the Deepfake Pandemic with Proactive Measures

We’re in the throes of another pandemic, but this time, it’s not transmitted through the air – it spreads with just a click. Welcome to the world of deepfakes. While COVID-19 significantly impacted our physical and mental well-being, deepfakes affect our minds differently. Their influence is causing confusion, mistrust and a distorted perception of reality, both personally and globally.

Protect your Hardware Security Module against edge cases with Code Intelligence

As vehicles become increasingly reliant on software, secure and functional Hardware Security Modules (HSMs) are paramount. Unknown vulnerabilities in your automotive software can pose a significant threat to your products and business by putting you at risk of coding errors or insecure configurations, which can be exploited by malicious actors or lead to consequential failures.

AWS CloudHSM vs. AWS KMS: Decoding the Best Encryption Solution for Your Business

Data protection is now one of the most acute problems of any business, be it a small venture or a corporate giant. In this dynamic and rapidly changing environment, the significance of strong encryption and proper practices for managing keys by organizations is gradually gaining acceptance. Amazon Web Services (AWS), the leading cloud computing platform, offers two powerful tools to safeguard sensitive data: The Cryptographic protocol for AWS CloudHSM and KMS are enlisted.

UniSuper's $125 Billion Cloud Catastrophe: Google's Accidental Deletion Reinforced the Importance of Backup Solution

The recent data loss incident involving UniSuper, a major financial player and Google Cloud serves as a reminder of the importance of implementing robust backup and disaster recovery solutions. Let’s delve into the details of the incident and explore why backups are essential for safeguarding against data disasters.