Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Virtru Partners with Nightfall to Deliver Intelligent Email Encryption for Data Security & Compliance

We’re excited to announce that Nightfall is partnering with Virtru, a renowned leader in email and SaaS encryption, to provide customers with an encryption solution for securing PHI in Gmail and Google Drive. Combined with our existing Google Drive data loss prevention (DLP) integration, this new solution will provide fully integrated compliance and security coverage for Google Workspace.

Speedcast Adds Software Path Certification from AWS to Its Cloud Qualifications, Bringing New Value to Customer Solutions

Technical validation of Speedcast SIGMA adds to the company's credentials within the APN, including Advanced Tier Services and AWS Public Sector Program. Speedcast's SIGMA platform runs on AWS to provide customers with simplified network management and quick adaptation for changing operational needs. Speedcast subject matter experts collectively hold more than 32 AWS certifications and 84 AWS accreditations to help customers navigate a secure and flexible path to cloud and application modernization.

5 Industries that need advanced Cybersecurity measures

Cybersecurity is more important today than ever before, with virtual threats surging to historic highs. Organizations in every industry need to take steps to protect themselves from cybercrime. A few sectors, in particular, should be especially concerned about safety. These industries are at the highest risk of being targeted by cyberattacks, with damages that can cost billions of dollars.

Analyzing Exmatter: A Ransomware Data Exfiltration Tool

Having conducted more than 3,200 incident response engagements in 2021, Kroll’s Threat Intelligence team now tracks more than 200 ransomware threat actor groups. Kroll’s global Incident Response teams are very familiar with actions traditionally associated with a network intrusion, from initial access to lateral movement to privilege escalation to data exfiltration—and in the case of financially motivated actors, ransomware deployment.

An Inside Look at ThreatQuotient's Own Security Initiatives

Last December, ThreatQuotient announced it had achieved SOC 2 Type II compliance for the ThreatQ Platform. The milestone is significant because it demonstrates third-party validation that ThreatQuotient continues to meet and exceed industry security standards, previously verified by Type I.

The Obsession with Faster Cybersecurity Incident Reporting

Requirements for reporting cybersecurity incidents to some regulatory or government authority are not new, but there has always been a large amount of inconsistency, globally, in exactly what the requirements are. More recently, there’s been a growing trend across government and regulatory bodies in the United States towards shorter timeframes for reporting of cybersecurity incidents. Here’s a brief rundown of the recent activity.

[New research] Subdomain takeovers are on the rise and are getting harder to monitor

The modern infrastructure is controlled by the DNS with pointers to both internal and third-party services. As a result, organizations are simultaneously expanding their attack surface and inviting potential cyber threats. Unknown subdomains can be challenging, as they are not always closely monitored.

Office Documents and Cloud Apps: Perfect for Malware Delivery

Microsoft Word, Excel, PowerPoint, and other Office document formats are popular among attackers, who abuse them to infect their victims with ransomware, infostealers, backdoors, and other malware. In this article, we look at the anatomy of a recent Office document attack from the victim’s perspective, highlight the most common types of Office document attacks seen today, and suggest strategies to reduce your risk of becoming the latest victim.

What incognito and private browsing modes do and don't do

There are countless reasons why you might want to keep the websites you’re visiting a secret. For example, you could be planning a surprise vacation for your best friend, seeking out information that’s meant to be banned in your country, or simply trying to minimize what advertisers know about you.