Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Data Scraping Legal Issues: Exploring hiQ vs LinkedIn Case

The high-profile case of hiQ Labs Inc vs LinkedIn Corporation (that took place in the US) shed light on the much-discussed data scraping legal issues. We know you don’t want to get lost in legalese. So, we have prepared an easy-to-read summary of the most important points of this decision. The court sided with the scraper and established that scraping public data is not a violation of the CFAA (Computer Fraud and Abuse Act).

Global SOC Survey Reveals Hope for SecOps Teams As Post-SOAR Hyperautomation Boosts Analyst Retention and Tenure

The SANS 2024 SOC Survey, a comprehensive new Torq-sponsored study, reveals that for the first time in decades, the tenure of SOC and Security Analysts is increasing. They’re choosing to remain at their posts for three-to-five years, up from an average of one-to-three years. Modern post-SOAR hyperautomation solutions are playing a significant role in alleviating the burdens these cybersecurity pros face.

How To Know If You've Received a Fake USPS Tracking Number

You can tell if you’ve received a fake USPS tracking number if the number doesn’t match the one in your confirmation email or on the USPS website. Continue reading to learn more about telling signs that the USPS tracking number you have received is part of a scam and how to prevent yourself from becoming a victim of fake USPS tracking number scams.

Dependency Management: Protecting Your Code

Managing dependencies isn’t always easy, but it’s critical for protecting your code. In this guide, we’ll explore what dependencies are and how they can be checked for known vulnerabilities, compatibility, licensing requirements, and more. We’ll then learn that dependency checks should be part of a dependency management strategy to keep applications up to date and reduce security risks and technical debt.

Protect Your Business from Being Cryptojacked!

Cryptojacking is rapidly emerging as the most popular type of attack on cloud native applications and infrastructure. Care to guess how many cryptojacking attacks were recording in 2023? As a reference point, in the year before (2022), there were 139M cryptojacking attacks. However, this number jumped 659% the following year (2023) to 1.06B! That averages nearly 3M cryptojacking attacks every day, on average.

Is Airport WiFi Safe?

No, using public WiFi in airports is not safe because you could unknowingly be sharing your private data with a cybercriminal. Because public networks are unsecured and airports are filled with people on the go, cybercriminals frequently target them to steal sensitive information and gain access to victims’ online accounts. Continue reading to learn what is so dangerous about using airport WiFi and how to stay safe if you do need to use it while traveling.

CVE-2024-6385: Critical Unauthorized Pipeline Job Vulnerability in GitLab

On July 10, 2024, GitLab issued an advisory regarding a critical vulnerability (CVE-2024-6385) in GitLab CE/EE that had been reported to them through a bug bounty program. This vulnerability allows a threat actor to trigger a GitLab pipeline as another user under certain circumstances. A GitLab pipeline is a collection of automated processes that run in stages to build, test, and deploy code.