Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Online Scams Are Shortening Their Cycles and Making More Money

New analysis of blockchain activity shows scammers are needing less time to obtain crypto payments and are seeing higher payoffs per scam. I continue to repeatedly cover breakdowns of cybercrime activity from the folks at Chainalysis because it represents an unbiased view that some security vendors may inherently have (because their data is based on what their solutions do and don’t discover).

Phishing Attacks Abuse Content Creation and Collaboration Platforms

Researchers at Barracuda have observed an increase in phishing attacks that abuse popular content creation and collaboration platforms. These include online graphic design platforms and document-sharing services widely used by educational institutions and businesses. “The analysts found that attackers are sending out emails from these platforms, featuring legitimate-looking posts, designs, and documents, but with embedded phishing links,” the researchers write.

How To Prevent Data Breaches in The Healthcare Industry

Imagine the worst-case scenario: a healthcare security leader receives a call in the dead of night, informing them that their network has been breached and all systems are down. Even a minor data breach in the healthcare sector can jeopardize patients’ personal health information (PHI), leading to identity theft, medical fraud, financial loss, or even the disruption of critical, life-saving medical services.

Trusted Software Delivered!

At swampUP 2024 in Austin just a few days ago, we explored the EveryOps Matters approach with the crowd of developers, driven by a consolidated view from their companies’ boardrooms and 2024 CIO surveys. The message was clear: “EveryOps” isn’t just a strategy or tech trend — it’s a fundamental, ongoing mindset shift that must drive developers’ proactive actions in an ever-evolving software landscape. It’s not optional; it’s essential.

Emerging cybersecurity trends: what tech-savvy users should watch for

The digital landscape is evolving rapidly, and with it, the threats posed by cybercriminals are becoming more sophisticated. Staying informed about the latest cybersecurity trends is crucial for anyone who wants to protect their digital footprint. Here, we delve into key trends that tech-savvy users should be aware of.

Untangling the Web: Why Proper Cabling Matters for Your Data's Safety

You rely on your network every day, but have you considered how its physical infrastructure affects your data security? Discover why proper cable installation is crucial for protecting your sensitive information. Learn about the risks of poor cabling and how professional installation can safeguard your data.

Top tips: Four ways organizations can reduce their attack surface

Top tips is a weekly column where we highlight what’s trending in the tech world today and list ways to explore these trends. This week, we’re looking at four ways you can minimize your attack surface. Organizational IT infrastructure is now more spread out, multi-layered, and complex than ever.

The importance of continuous attack surface management in cyber security

In today’s interconnected world, cyber threats continue to evolve at a rapid pace. As businesses grow more reliant on digital systems and services, the cyber security attack surface—the totality of an organisation’s digital exposure—has expanded, increasing the risks faced by security teams. The complex nature of these threats calls for a more adaptive and responsive approach to security, particularly in identifying and mitigating vulnerabilities before they can be exploited.