Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

What is a Whaling Attack (Whaling Phishing)? Definition & Examples

According to the FBI Internet Crime 2020 Report, phishing scams were the most prominent attack in 2020 with 241,342 complaints reported and adjusted losses of $54 million. In particular, whaling (a highly targeted phishing attack) has been on the rise and is only expected to grow from here. A whaling attack targets high-profile executives with access to valuable information and systems. Let’s take a closer look at whaling attacks and how to stay protected.

8 Steps to a Successful Cloud Data Migration

It is rare nowadays to hear of a business strategy that doesn’t entail a cloud strategy. So it comes as no surprise that 85% of organizations are expected to embrace a cloud-first principle by 2025, as estimated by Gartner. But migrating all your organization’s data, applications, and business processes to a new environment can be daunting.

Key cyber security tips to secure your business in 2022

Businesses of all sizes would benefit from raising their awareness of the potential threats for the year ahead. Hackers are not only exploiting new vulnerabilities such as Log4Shell, but also continuing their use of tried-and-tested methods like phishing and attacking unpatched systems to compromise the security of businesses. There are also challenges in achieving compliance which will be a barrier for organisations looking to secure business and supply chain data.

CVE-2022-23628, OPA and Styra DAS

CVE-2022-23628 was published last week by the Open Policy Agent (OPA) project maintainers after a user reported unexpected behavior from a policy bundle that was built with optimizations enabled. The problem stemmed from a regression fix in the v0.33.1 release that addressed incorrect pretty-printing of Rego object literals by the `opa fmt` command and the underlying `format` package.

Humans can never be as quick or as intelligent as bots when it comes to identifying threats

Originally posted on CyberNews. As more businesses race to shift their operations online, new website owners have to adapt to a new way of doing business and deal with a variety of online threats. While most of us think of disrupted websites or servers going offline when we hear the words “bot attack,” the reality is often different.

Data Storage in Kubernetes

If you’re reading this article, you’re probably either running a Kubernetes cluster or planning to run one. Whatever the case may be, you will most likely need to have a look at data—how to store it and how to secure it. There are different types of stored data in Kubernetes: In this article, we will review how to deal with each of these data types in a Kubernetes cluster.

The Changing State of Cybersecurity: 5 Data-Backed Predictions

Cybersecurity is never static, and that’s especially true today. After widespread and frequent disruptions in the past few years, the cyber defense landscape is shifting. Favored attack vectors are changing, new threats are emerging, and organizations are rethinking their cybersecurity focus. Staying safe in the next few years requires an understanding of these developments. With that in mind, here are five data-backed predictions for how the state of cybersecurity will change.

Email Security Trends Coming in 2022

Organizations are under constant threat of cybercrime. While there are many available attack vectors, email is the most obvious path towards a full network compromise. The notion that email security should be prioritized is emphasized during this time where more and more businesses are still working in a remote or hybrid dynamic environment.