Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

The Royal & BlackCat Ransomware: What you Need to Know

The US healthcare sector continues to be aggressively targeted by ransomware operators. Royal and BlackCat are two of the more recent – and highly sophisticated – ransomware threats. These two new flavors of ransomware pose serious potential impacts on the healthcare sector, but there are appropriate mitigation and defense strategies that organizations can take to protect against them.

A Brief Introduction to the World of IP Addresses

How many internet-connected devices do you own? If you took a quick inventory around your house, you may be surprised at exactly how many there are. Have you ever wondered how they all communicate, not only with each other, but with the internet as well? This is, in part the result of technology known as IP addressing.

How to Secure Your SCM Repositories with GitGuardian Honeytokens

Protect your code and secure your repositories with honeytokens. Learn how to create and add these digital traps to your SCM repositories and how GitGuardian helps you stay alert to potential threats. Read on for best practices and tips to make the most out of honeytokens.

API7:2019 Security Misconfiguration: The What, Sample Exploits, and Prevention Methods

Security misconfigurations are very common security risks, not just in web applications but also in APIs. They have been consistently part of the OWASP Top 10 Web Application Vulnerabilities. They were part of the original OWASP Top 10 API Security Risks published in 2019 and have now made it to the updated 2023 list. Security misconfiguration maintains its 7th rank in OWASP Top 10 API 2023RC owing to its widespread prevalence, easy exploitability, and easy detectability.

30+ Password Statistics - An Analysis of Password Trends in Cybersecurity

In 2021, unauthorized access was responsible for 43% of data breaches. Among the data breaches that did not involve an error, misuse of privilege, or physical action, 62% were a result of stolen credentials. This Blog Includes show Password Security Statistics Password Reuse Statistics Password Sharing Statistics Password Management Statistics Password Breach Statistics What is a strong password? Conclusion FAQs How can a password be stolen? What should I do if my password manager is hacked?

Former Tesla Employee Takes 100 GB of Confidential Data in Serious Data Breach

Tesla, one of the leading electronic vehicle manufacturers in the world today, recently suffered from a massive data breach that resulted in extensive data being released to the public. The company employs more than 127,000 individuals and has an annual revenue of $81.46 billion. A huge amount of employee data and proprietary technological information is held on the Tesla file servers, and allowing it to be hacked and released to the public is a huge security misstep.

CIS Critical Security Control 4 Explained

CIS Critical Security Control, known now as CIS Controls have recently been updated and revised in the CIS Controls v8 released by the Center for Internet Security (CIS). The CIS Controls are a collection of industry-recognized best practices for businesses dealing with data security risks. Such measures were created to make things easier and keep the IT operations and security teams attention on crucial tasks. In v8, CIS changes a little the perspective around baseline security and system hardening.

Digital Transformation Is a Major Driver of Network Transformation

Many organizations are in the midst of rapid digital transformation. In the past few years, numerous new and promising technologies have emerged and matured, promising significant benefits. For example, many organizations are rapidly adopting cloud computing, and the growing maturity of Internet of Things (IoT) devices has the potential to unlock new operational efficiencies.

Webinar - Solving the Secrets Management Puzzle

Secrets sprawl is showing no signs of a slowdown. Last month, we revealed 1 in 10 code authors exposed a secret on GitHub in 2022, collectively leaking 10 million secrets (you read that right, T-E-N) on the platform. This time, we're stepping beyond the data. We went on a (virtual) field trip and asked 500+ CISOs and engineering leaders how they currently deal with hardcoded secrets, how they intend to solve their organization's secrets management puzzle, their top priorities and investment areas in AppSec and Dev tooling, and many other questions!