Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Cloud Threats Memo: More Details on Long-Lasting Campaigns Targeting Eastern Europe

In a previous memo, I mentioned the discovery, made by researchers at Kaspersky, of an active campaign carried out by an advanced threat actor since 2021, targeting multiple organizations in the regions of Donetsk, Lugansk, and Crimea. One of the noteworthy aspects of this campaign was undoubtedly the usage of a new backdoor, called PowerMagic, characterized by the exploitation of the popular cloud storage services, Dropbox and OneDrive, as the command and control infrastructure.

Discovering and Managing Sensitive Information in Microsoft Repositories

If you use Microsoft SharePoint, OneDrive, or Exchange Online to store and share your business content, you may be wondering how to protect it from unauthorized access, data breaches, or compliance violations. That's where Egnyte comes in. As a source-agnostic data governance and collaboration solution, Egnyte integrates with Microsoft Office Online, Office Mobile, and SharePoint Online to provide a seamless user experience and powerful workflows for opening, editing, sharing, and securing files.

UTMStack Unveils Ground-breaking Artificial Intelligence to Revolutionize Cybersecurity Operations

Doral, Florida UTMStack, a leading innovator in cybersecurity solutions, has announced a significant breakthrough in the field of cybersecurity – an Artificial Intelligence (AI) system that performs the job of a security analyst, promising to transform cybersecurity practices forever.

Take action now to avoid BianLian ransomware attacks, US Government warns organisations

The US Cybersecurity and Infrastructure Security Agency (CISA), FBI, and others have issued a joint alert, advising organisations of the steps they should take to mitigate the threat posed by BianLian ransomware attacks. BianLian, which has been targeting different industry sectors since June 2022, is a ransomware developer, deployer and data extortion group which has predominantly targeted enterprises.

How to Get on The Dark Web Safely

Inquisitive minds are curious and seek out new knowledge, asking questions that will receive detailed answers. Anyone who considers themselves inquisitive should avoid the “Dark Web” or approach with extreme caution. The Internet is more complex by the hour, with nearly two billion websites and growing, the average user accesses only about ten percent of this massive resource.

What is Swatting and How to Prevent It

Over centuries, harassment has been rooted in the global human condition. Modern America continues to grapple with intimidation, sexual abuse, bullying, and much more, all of which have severe implications for the victims. Ignoring the root causes of one person maliciously targeting another as a lower part of society is morally wrong. Persistent and unwanted targeting has been inflamed in recent decades by the worsening of fundamental human rights.

The Tools You Need to Pass a SOC 2 Audit

Achieving SOC 2 compliance often necessitates the use of specialized tools and software to address specific application and data security measures, but which ones are the best to get the job done? We asked our customers which tools they used and compiled their answers below. Now, let’s break down the tools that have helped our customers achieve compliance excellence, so you can, too. Tools or services marked with * denotes a partner or integration.

Xalient Aruba EdgeConnect

Is your IT checklist growing by the day? Are you struggling to keep up with digital transformation while meeting customer demands for speed, security, and performance? Watch this video and discover how Aruba EdgeConnect SD-WAN can transform your network and security architectures while keeping your business running seamlessly and efficiently around the clock.