Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

The Top Cyber Attacks of August 2022

Ransomware dominated the cybersecurity sphere yet again in August, with victims ranging from wealthy European nations to humble libraries to one of the most storied franchises in American sports. Also, people who send disgusting pranks via mail got some of their business put out on the street. What can we say, it was a weird month. Here are some of the breaches, hacks, and attacks that captured our attention in August 2022.

Persistence and Patience: Two Qualities You Don't Want Your Ransomware Attacker to Have

Modern organizations are built on data. It enables collaboration and helps us engage with customers. But that same helpful data is also sprawled across countless apps, making it difficult to secure. Ransomware attacks are on the rise — 57% of security leaders expect ransomware to compromise their organization within the next year — which makes data protection more essential than ever.

Addressing the Invisible Security Problem of Open File Shares

According to a recent survey from the Cloud Security Alliance, cloud issues and misconfigurations remain the leading causes of breaches and outages—and 58% of respondents report concerns about security in the cloud. Their worries are well-founded. Nearly every day, we see examples of a company’s sensitive data spilling out of leaky clouds.

Securing data through the compliance lens

As globalization takes shape and government regulations defy borders, the issue of compliance risk remains a top-level business issue. Growing concerns over consumer privacy and data security have prompted a rush of legislation intended at holding corporations more accountable for maintaining and sharing the information they collect about consumers.

MD5 vs SHA1 vs SHA2 vs SHA3 - Compare Hashing Algorithms

As the physical and digital worlds are coming together by the day, the need to protect our privacy and confidentiality is becoming more pivotal. Securing data is essential for everyone, including an organization, a person, or any digital entity. In the world of digital security, hashing and encryption are two important protection structures. Let’s keep encryption for another time and focus on hashing for today.

How to Write a Fuzz Test for JavaScript

JavaScript is widely used in both backend and frontend applications. Crashes that cause downtime or other security issues are very common in nodejs packages. Our goal with Jazzer.js is to make it easy for developers to find such edge cases. In this webinar, Norbert will show you how to secure JavaScript applications using our open-source fuzzer Jazzer.js.

CDN Security - How Does It Help with Website Security?

Cyberattacks have become more sophisticated, and they have the potential to cause severe disruption to service availability and financial loss to businesses. According to Gartner, IT downtime costs businesses $5,600 p/minute on average. For every business with an online presence, being able to serve user requests and deliver content in a secure, reliable, and speedy manner is critical. This is where content delivery networks (CDNs) come in.