Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Polyfill Supply Chain Attack Injects 100,000+ Websites with Malware via CDN Assets

Polyfill.js is a Javascript library that helps old browsers run new modern features which these old browsers do not support natively. The library is popular among developers for helping them offer consistent user experience regardless of the browser environment the user is using. In February 2024, a Chinese company bought the domain polyfill.io and the Github account associated with it. Since then, they’ve been serving malware via cdn.polyfill.io as pointed by the team at Sansec.

KnowBe4 Recognized as Cyber Security Educator of the Year at IT Europa Awards 2024

It's a great honor for KnowBe4 to be named the Cyber Security Educator of the Year at the prestigious IT Europa Channel Awards 2024. This award recognizes our continued commitment and innovative approach to building a strong security culture and empowering organizations to manage the ongoing problem of social engineering. This achievement is a testament to the hard work and passion of our team in building the world's most comprehensive security awareness training and simulated phishing platform.

Creating Users Manually | JumpCloud University Tutorial (2024)

In this tutorial, we will go over how to create a user in JumpCloud manually. This method can be used when you need to add a single user. To discover more resources checkout JumpCloud University where you’ll find courses, tutorial videos, engaging guided simulations, and end user content.

Third-Party Risk Management Dashboard: How to Design One

In today's interconnected business landscape, Third-Party Risk Management (TPRM), sometimes called vendor risk management (VRM), is a critical cybersecurity strategy for organizations aiming to safeguard their operations and reputation. With most companies increasing their reliance on external vendors and service providers, managing and mitigating risks associated with these third-party relationships is paramount.

DAST Vs. Penetration Testing: Comprehensive Guide to Application Security Testing

For two decades or so now, web applications have been the backbone of many businesses, making their security paramount. Dynamic Application Security Testing (DAST) and penetration testing are crucial for identifying and mitigating security vulnerabilities in web application security. While both aim to enhance application security, they differ significantly in their approach, execution, and outcomes.

How to Enhance Ubuntu Security: Advanced Features and Techniques

Jump to Tutorial Ubuntu, a popular Linux distribution, is known for its robust security features. There is always space for improvement once you install a fresh operating system, so in this article, we will guide you through the advanced techniques and features to enhance the security of the latest Ubuntu 24.04 version. There are multiple layers of security that Ubuntu offers out of the box, but we can implement additional steps that can further protect your system from threats.

TeamViewer Corporate Network Breached in Alleged APT Attack

In a concerning development, TeamViewer, one of the world's leading remote access software providers, has disclosed a cyber attack that breached its corporate network environment. The incident was first detected on June 26, 2024, when TeamViewer's security team identified irregularities in their internal IT infrastructure. Responding swiftly, TeamViewer activated its incident response procedures and engaged renowned cybersecurity experts to investigate and mitigate the breach.

Inbox on Lockdown: Stop Email Leaks Before They Happen

Ever hit send on an email and immediately felt that sinking feeling? Maybe it was an attachment containing sensitive data that was misplaced, or that clever phishing email that convinced a colleague to cough up login credentials. These are cases that clearly explain the critical need for Email Data Loss Prevention (DLP).