Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Leading Reason for Data Loss: Social Engineering & Insider Threats

When it comes to data loss, the biggest yet common dangers these days come from within the organization, and social engineering and insider threats are one of the main reasons. This shows that human mistakes are just as risky as external attacks. In this piece, you’ll see how social engineering and insider threats result in data loss. In addition to that, you’ll look at real examples to understand the seriousness of such threats and talk about steps companies can take to protect themselves.

Why Risk-Based Vulnerability Management (RBVM) Increases Your Security Debt, and How You Can Fix It

In this Nucleus webinar, we take a deep dive into the practical challenges and strategies for managing security debt in the context of Risk-Based Vulnerability Management (RBVM). Scott Kuffer, co-founder of Nucleus Security and veteran in vulnerability management, explains how RBVM has shifted from a holistic risk reduction approach to a prioritization-heavy process that often falls short. He discusses why traditional methods lead to excessive security debt and demonstrates how aligning VM processes with product management principles can create more efficient, business-centric remediation.

QR Code Phishing is Growing More Sophisticated

Sophos describes a QR code phishing (quishing) campaign that targeted its employees in an attempt to steal information. The attackers sent phishing emails that appeared to be related to employee benefits and retirement plans. The emails contained PDF attachments which, when opened, displayed a QR code. If an employee scanned the code, they would be taken to a phishing page that spoofed a Microsoft 365 login form. The page was designed to steal login credentials and multi-factor authentication codes.

Insider Threats & Third Party Risk: How to Manage Security Threats | Razorthorn Security

Every vendor you trust and every employee you hire could be your next security crisis—explore the realities of third party risk and insider threats on this episode of Razorwire! Join us for a discussion on the multifaceted challenges of third party risk and how they can destabilise your organisation. From the growing complexities of cloud providers like AWS and Azure to detecting and dealing with insider threats, our conversation covers it all.

Beyond UEBA: Elevating Insider Risk Management with Behavioral Intelligence

Insider risk management is more critical than ever as human error and insider threats drive escalating security breaches. While many organizations have adopted User and Entity Behavior Analytics (UEBA) to monitor potential risks, relying solely on UEBA may fall short of the depth needed to stay ahead of these increasingly complex threats.