Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

5 Misconceptions About Penetration Testing for Mobile Apps

People these days use mobile apps for everything from ordering groceries and medicines to paying loan EMIs and sending or receiving money. While it sounds convenient, users' private info, such as email, home address, bank details, etc., is always at risk of being stolen. Therefore, it becomes the duty of app development companies to take up stringent measures to ensure complete security for their users. And that's when penetration testing comes into the picture.

How to Reduce Your Cybersecurity Insurance Premium in 2022

Cyberattacks are growing in prevalence and sophistication, and so are the damage costs associated with these events. According to a 2022 cost of data breach report, the average damage cost of a data breach has reached a record high of USD 4.35 million. Provoked by increased data breach damage costs, a growing number of US businesses are partnering with Cybersecurity Insurers, who, in turn, respond to this increased demand by inflating cyber insurance premiums.

Stories from the SOC - Credential compromise and the importance of MFA

User account credentials are both a necessary component of normal operations and a critical vector for a malicious actor’s entrance into an enterprise environment. Compensating for the inherent risk of granting the end user access to corporate systems is a challenge in balancing usability with security. When a user with low-level privileges can have their credentials abused to gain increased levels of access, superior solutions to standard username-and-password schemes become necessary.

Don't Hack the Computer - Hack the Person! Recently Observed Social Engineering Attacks

When most people think about the origin of a cyberattack, the image is that of a hacker using some kind of exploit against software or hardware in order to gain unauthorized access to systems. The hacker is seeking data to exfiltrate and monetize, either through re-sale on the darknet or extortion through ransomware.

Cybersecurity in iGaming: How to Protect Your Business from Cybercrime

When the American heist comedy Ocean’s Eleven was released on Friday, December 7, 2001, it topped the box-office draw for that weekend. The story follows two friends who plan to steal $160 million from three major casinos in Las Vegas. Entertainment Weekly called it “the most winning robbery sequence of the decade”.

Keeper vs Bitwarden: A Side-by-Side Comparison

Keeper Security and Bitwarden are password management solutions offering varying user features and benefits to their customers. Bitwarden is a good password manager with a password generator tool, autofill, two-factor authentication and more. Keeper is an enterprise solution that offers these same capabilities and more—combining a password manager with secrets management and connection management.

CVE-2022-31656 - Critical Authentication Bypass Vulnerability in Multiple VMware Products

On Tuesday, August 2, 2022, VMware disclosed a critical-severity authentication bypass vulnerability (CVE-2022-31656) impacting multiple VMware products, including VMware’s Workspace ONE Access, Identity Manager (vIDM), and vRealize automation. If successfully exploited, the vulnerability could allow a threat actor with network access to the user interface to obtain administrative access without needing to authenticate.

The Importance of a Machine Learning-Based Source Code Classifier

This is the fifth in a series of articles focused on AI/ML. Source code is a critical part of an organization’s intellectual property and digital assets. As more and more centralized source code repositories are moving to the cloud, it is imperative for organizations to use the right security tools to safeguard their source code.