Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Ticker News: Major 2024 Cybersecurity Concerns With Loris Degioanni, Sysdig

Loris Degioanni, CTO and Founder of Sysdig, stopped by the Ticker News studio to discuss the major cybersecurity concerns of 2024. In the cloud, attacks are fast. Companies have 5 seconds to discover an attack, 5 minutes to investigate, and 5 minutes to respond. How can companies secure their environment when keeping pace with the speed of the cloud?

China Threat Actor Targeting African and Caribbean Entities With Spear Phishing Attacks

The China-aligned threat actor “Sharp Dragon” is launching spear phishing attacks against government entities in African and Caribbean countries, according to researchers at Check Point. “In recent months, we have observed a significant shift in Sharp Dragon’s activities and lures, now targeting governmental organizations in Africa and the Caribbean,” the researchers write.

KnowBe4 Free Tools Now Available On CISA's Website

We are big fans of the U.S. Cybersecurity Infrastructure Security Agency (CISA), whose informal slogan of “An organization so committed to security that it’s in our name twice” is a source of pride. CISA is a non-regulatory government agency dedicated to protecting U.S. and global infrastructure and organizations against malicious hackers and their malware (and other types of threats).

Complying With the New SEC Cybersecurity Regulations: A How-to Guide

‍Since the SEC's latest cybersecurity regulations went into effect, thousands of companies have already been compelled to submit their annual Form 10-K with the novel Item 1C. Similarly, dozens of organizations have filed updated Form 8-Ks to disclose cybersecurity incidents. Slowly but surely, these public reports are helping investors become more aware of the intrinsic relationship between cyber risk and market value.

5 Best Tools for Digital Nomads to Work Securely From Anywhere

The allure of the digital nomad lifestyle has attracted over 40 million people worldwide looking to escape the office and work from the beach, inner city, or remote islands. Obviously, a decent laptop and a stable internet connection are required for this lifestyle. Outside of these, there are more tools for digital nomads they should bring with them as they travel the globe. These tools relate to: However, security and privacy are important concerns for digital nomads working in unfamiliar places.

Data Privacy in Online Marketing: What Is Changing & How to Adapt?

Thanks to digital innovations, we can easily connect online, but they also leave us increasingly vulnerable and exposed.68% of consumers are concerned about the volume of data businesses collect about them, with 40% expressing a lack of trust in companies’ ethical handling of data. Therefore, it’s no surprise that data privacy regulations are constantly improving.

IDC Validates Torq HyperSOC: A Game-Changer for SOC Analysts

IDC declares Torq HyperSOC the first solution to effectively mitigate SOC alert fatigue, false positives, staff burnout, and attrition. In a groundbreaking report, IDC emphatically recognizes the potential of Torq’s latest innovation, Torq HyperSOC, hailing it as a pivotal addition to the SOC analyst toolkit.

DDoS-as-a-Service: The Rebirth Botnet

In March 2024, the Sysdig Threat Research Team (TRT) began observing attacks against one of our Hadoop honeypot services from the domain “rebirthltdio). The threat actors operating the botnet are financially motivated and advertise their service primarily to the video gaming community, although there is no evidence that this botnet is not being purchased beyond gaming-related purposes, and organizations may still be at risk of falling victim to these botnets attacks.

Top 9 Software Supply Chain Security Tools

Imagine this: an attacker sneaks a tiny backdoor into software that hundreds of companies use. It sounds like a plot from a spy movie, but it’s a real threat that recently impacted major Linux distributions through a compromised utility tool, XZ Utils. So far, in 2024, over 35 billion known records have been breached. The Linux attack, potentially in action and undetected since 2021, is just one of the many that highlight the alarming proliferation of supply chain attacks.

Fastify plugins as building blocks for a backend Node.js API

In the world of building backend Node.js APIs, Fastify stands out with its plugin ecosystem and architecture approach, offering a compelling option beyond the conventional Express framework. This highly efficient, low-overhead web framework distinguishes itself through its remarkable speed and streamlined simplicity.