Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Top 5 Most Commonly Used IoT Protocols and Their Security Issues

What happens when devices meant to make your life easier become tools for intrusion? Your smart TV could become a surveillance device, your fitness tracker could leak your health data, and your connected car could be remotely hijacked. In the world of IoT vulnerabilities, the technology designed to serve you could turn against you. The Internet of Things promises convenience and connectivity. The risks of cyberattacks targeting these devices are growing exponentially.

Bring-Your-Own-Data (BYOD) to the Kondukto Platform

During this year’s RSA conference in San Francisco, we announced our new exciting platform capability: “Bring-Your-Own-Data” (BYOD), which allows customers to integrate their unique data-streams into the Kondukto Platform. Integrating diverse sets of data has become critical for AppSec. “Bring-Your-Own-Data” drastically improves the visibility for security teams into the application security stack of complex environments.

Five new vulnerabilities found in Zyxel NAS devices (including code execution and privilege escalation)

During some standard research as part of the Outpost24 Vulnerability Research Department, I discovered 5 vulnerabilities in Zyxel NAS devices: The vulnerabilities were disclosed to Zyxel on 2024-03-14 as part of our responsible disclosure policy, and have been resolved at the time of publishing this post (2024.06.04).

PowerShell Code Signing Best Practices for Signing Your Script

PowerShell is a powerful tool that is used for automating monotonous and time-consuming tasks. However, using these without code signing can leave you vulnerable to cyber-attacks. This blog will explain the PowerShell code signing best practices for signing your script. Let’s begin!

Malware vs Virus: Similarities and Differences

With new technological advancements continuously emerging, cybersecurity is becoming a paramount concern for individuals and organizations alike. Among the plethora of cyber threats, two terms are often used interchangeably, i.e., malware and virus. However, the fact is that these are not the same and have distinct meanings. The term “malware” can be used for any sort of virus, but viruses can not describe malware types.

DevOps Lifecycle Explained: Definition, Phases, Components, and Best Practices

With constant developments being made in the area of software development, both development and operations teams are now inseparably tied in their processes, and this has become a vital factor for their success. In recent years, DevOps, a concept built from the words’ developer’ and ‘operator,’ was developed as a new way of working that intelligently integrates these two essential functions throughout the software delivery process.

Creating a new LLM connection with Motific

This demo highlights how Motific simplifies the journey of requesting a GenAI application, going through the approval process, connecting it with the right information sources, and provisioning an application to meet business requirements. With Motific, you can gain flexibility without complexity for easy deployments of ready-to-use AI assistants and APIs.

Engaging the Dark Web: Innovative Strategies to Deter Cyber Attacks

Robert Black explores how organisations can actively engage with the dark web to shape and influence threat actors. By taking an organisational approach rather than a purely technical one, companies can dissuade attackers and protect their assets more effectively. Discover unconventional methods to enhance your cybersecurity posture.

[NEW RESEARCH]: KnowBe4's 2024 Phishing by Industry Benchmarking Report Reveals that 34.3% of Untrained End Users Will Fail a Phishing Test

The prevalence of cyber crime continues to soar, victimizing individuals in both their work and private lives. Cybercriminals are indiscriminate, targeting around the clock and across the globe. With digital security advancing, these criminals shift their focus to exploiting human weakness amidst increasingly secure technological environments.

Enhance NIS2 Compliance: Elevate Your Cybersecurity with Awareness & Culture Before The Deadline

The NIS2 Directive, also known as the Network and Information Security Directive, is a crucial piece of legislation designed to enhance cybersecurity and protect critical infrastructure across the European Union (EU). Building on the previous NIS Directive, it addresses its shortcomings and expands its scope to improve security requirements, reporting obligations, and crisis management capabilities.