Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

12 Cash App Scams to Know and How to Avoid Them

Whether it’s splitting the bill after a night out on the town or sending money for your niece’s graduation, more Americans are relying on peer-to-peer payment services like Cash App than ever before. It’s a quick and seamless way to make financial transactions trusted by millions of users. Cash App makes it easy to receive and send money and is renowned for its convenience. But while Cash App transactions are generally safe, users could still be susceptible to Cash App scams.

Year in review: ManageEngine Log360's analyst recognition from 2022

Cyberattacks have intensified over the last few years as threat actors are always improvising their game plan to carry out new and sophisticated methods. Concepts like Ransomware as a Service have made it easy for small threat groups to leverage weaponized services with devastating results for organizations. This highlights how traditional security systems and approaches are no longer able to keep up with the ever-evolving threat landscape.

What is PowerShell? Things to know about PowerShell Code Signing

With the increase in automation, PowerShell scripts are rapidly coming into action. Every industry utilizes some software, running scripts in the background to ease core operations. Whenever companies or users have to run any script, the first task is verifying its legitimacy. And the best method to do so is by checking the publisher’s signature. PowerShell Code Signing Certificates getting are highly utilized as every scripter, developer, and publisher wants to grow.

Enterprise Remediation with CrowdStrike and MOXFIVE, Part 1: Five Tips for Preparing and Planning

Timing is everything when it comes to responding and recovering from a widespread, destructive attack. As threat actors operate undetected across a victim network and get deeper into the attack lifecycle, it becomes increasingly more challenging to recover and avoid the business disruption that comes from a compromised environment.

The 7 Most Significant Hacks of 2022

At SecurityScorecard, we like to look ahead and focus on the future. However, the past can also teach us some valuable lessons, particularly in cybersecurity. 2022 was quite an eventful year in the space, with many high-profile attacks, including full-blown cyber warfare. Out of all threats we saw this past year, a few stood out. This article will cover seven of the most dangerous cyber threats of 2022, in no particular order.

5 Reasons Why You Need to Review Your Data Privacy Policy Now

‍ Without a doubt, data privacy will be a much bigger focus for small- and medium-sized businesses in 2023, as the U.S. states of California, Colorado, Connecticut, Utah, and Virginia all enact stricter privacy legislation. Similarly, the Canadian province of Quebec is also in the process of updating its data privacy laws.

2022 in Cybersecurity - That's a Trap

Are you sitting comfortably? Then let us begin… No, this isn’t the start of some Christmas fairy tale… it’s how I begin reading most reports which cover the last 12 months in Cybersecurity, and there are quite a few to look at. But for me, the one I value most is the ENSIA Threat landscape (ETL) report, which is now in its tenth year.

Are passwords really as safe as we think?

Passwords are the most basic and common authentication method used to secure access to systems. But the process of using and maintaining secure passwords for numerous platforms can be quite tedious. According to Verizon`s 2020 Data Breach Investigation Report, weak, and re-used passwords resulted in 81% of data breaches. Apart from that, there are many more vulnerabilities and risks related to passwords, passwords are an increasingly unsuitable authentication option.

3 Key Use Cases Along the SASE & Zero Trust Journey

In the first part of this blog series, I took a look at how an understanding of digital strategy and digital risk is key to starting a security transformation journey. And in the second, I dug further into how a secure access service edge (SASE) architecture with security service edge (SSE) capabilities and zero trust principles can help mitigate the types of digital risk. In this final part, I will outline a few key use cases to show all of these elements in action.