Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

WatchGuard Advanced EPDR Is Now Available in the Unified Security Platform

We are thrilled to announce the launch of WatchGuard Advanced EPDR as part of our Unified Security Platform® architecture. Now available in WatchGuard’s distribution channels, WatchGuard Advanced EPDR is tightly integrated within WatchGuard Cloud and ThreatSync, delivering valuable visibility and intelligence while fortifying cross-product detection and response.

Project Eden: The Technical Perspective

12 of the most prominent banks gathered at Tel Aviv Stock Exchange (TASE) on May 31st, 2023, to participate in Project Eden, a highly-anticipated PoC of the first digital government bond issued by the Israeli Ministry of Finance. International and domestic banks – Barclays, BNP Paribas, Deutsche Bank, Goldman Sachs, J.P.

Global Communication Service Providers: Market Growth Fuels Security Investments

As the world experiences uncertainty stemming from economic, social, and geopolitical disruption, digital connectivity has never been more important to address inequality, support communities and drive global business recovery. This survey interviewed 2,750 communication service provider IT professionals. Respondents come from a broad range of provider types, data center/co-location, service providers and fixed wireless access providers.

Jira Backup Best Practices - GitProtect.io at Baltimore ACE May 2023 Atlassian Community Event

Want to have constant access to your Jira data event during the worst disaster scenario? Then you need to know which Jira backup best practices to follow to recover your data fast and guarantee your business continuity. Join GitProtect expert’s, Bartosz Jurga, presentation at the Baltimore ACE May 2023 Atlassian Community event and learn.

Checklist for Developers to Build Secure APIs

APIs were already ubiquitous in driving modern applications. However, the pandemic has further accelerated growth in innovation and expansion of digital services, making APIs even more widespread. In today’s world, rapid innovation would not be possible without secure APIs. Attacks on APIs are increasing exponentially. Gartner suggests API abuses are the most significant attack vector since 2022. Hence securing APIs is more critical than ever in the past.

Capturing Secrets from Environment Variables via CircleCI

CircleCI is a platform that enables continuous integration and delivery of software projects. It allows teams to automate their software development process by building, testing, and deploying their code changes in a consistent and reliable manner. In this blog post, we will explore the Tactics/Techniques/Procedures (TTP) of how environment variables that house sensitive credentials and secrets can be exfiltrated using Circle CI.

New Phishing Campaign Uses Hyperlinked Images for Fake Gift Cards and Promotions

A phishing campaign is using hyperlinked images in order to trick users into visiting malicious sites, according to Jeremy Fuchs at Avanan. The emails contain images that offer gift cards or promotions for Delta or Kohls. “Obfuscation is a gift to hackers,” Fuchs says. “It allows them to pull off a magic trick. It works by hiding the true intent of their message. In this case, it’s a picture. The picture is meant to entice the user to click.