Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Data Security Best Practices for Cloud CRM Systems as Adoption Surges

For the past few years, the CRM market has witnessed steady growth and it is projected to reach $89 billion by 2024. Estimates are that this growth will continue into the foreseeable future. Essentially, CRM systems have come to stay and have become the backbone of many organizations. However, the bleak state of cybersecurity cuts across many industries, and CRM systems are equally vulnerable.

The Growing Threat Of Fake Job Applicants

It cannot be denied that the rise of remote work has opened up many opportunities for both employers and job seekers. Despite this, however, it has also presented a plethora of challenges when it comes to recruiting in the cybersecurity and tech spaces, one of the most notable of which is the proliferation of candidates who either don’t exist entirely or who aren’t who they claim to be.

The Number of Ransomware Attacks Around the World Increased by 73% in 2023

The number of ransomware attacks around the world increased by 73% in 2023, according to a new report by the Institute for Security and Technology’s Ransomware Task Force (RTF). These attacks opportunistically target organizations across all industries, but the hardest-hit sectors over the past two years have been construction, hospitals and health care, government, IT services and consulting, and financial services.

Threat Context Monthly: Executive intelligence briefing for September 2024

Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news and threat information from KrakenLabs, Outpost24’s cyber threat intelligence team. Here’s what you need to know from September.

Mastering Data Masking: Key Strategies for Handling Large-Scale Data Volumes

Masking large volumes of data isn’t just a bigger version of small-scale masking—it’s exponentially more complex. High-volume data masking introduces unique engineering challenges that demand careful balancing of performance, integration, accuracy, and infrastructure costs. In this blog, we’ll dive into the critical factors you must consider when choosing the right tool for large-scale data masking, helping you confidently navigate these complexities.

Data Protection Officers and Their Key Responsibilities

Data breaches, cyberattacks and misuse of personal information are severe threats challenging the privacy of customer’s data, they can not only damage a company’s reputation but can also lead to heavy fines if compromised. To overcome these challenges, data protection laws are established. Data protection laws safeguard personal information and establish important guidelines on collection, storage, processing, sharing and disposal of personal data.

Smishing vs. Phishing: 5 Examples of Each

In social engineering attacks like smishing and phishing, the mind is the real target. How often do we quickly glance at a text or email and click without a second thought about its origins? Scammers know this, so they prey on the urgency conveyed in the convincing messages sent to your valued customers and unprepared coworkers. Opportunistic scammers send 3.4 billion spam emails daily.

Apono Secures $15.5M Series A Funding to Revolutionize Cloud Access Security

Apono is proud to announce the successful completion of its Series A funding round, raising $15.5 million to further its mission of delivering AI-driven cloud access governance. This funding round, led by New Era Capital Partners with participation from Mindset Ventures, Redseed Ventures, Silvertech Ventures, and existing investors, brings Apono’s total investment to $20.5 million.

Emerging Security Issue: SolarWinds Web Help Desk CVE-2024-28987

CVE-2024-28987 is a critical (CVSS v3 score: 9.1) hardcoded credential vulnerability in the SolarWinds Web Help Desk (WHD) software. If exploited, this Java deserialization remote code execution (RCE) vulnerability allows attackers remote unauthenticated access to create, read, update and delete data on specific WHD endpoints.