Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Blue Green Deployment vs Canary

A buggy rollout or, even worse, a security breach can lead to user frustration, lost trust, and damaged reputation. To keep users happy and your brand protected, you need a robust deployment strategy that balances seamless updates with ironclad security. 32% of customers abandon a brand they love after just one negative interaction. For software teams, this means that every update is a high-stakes moment. Can we ensure both a positive user experience and robust protection during every rollout?

Why an outdated router can compromise your company's security

In today's digital age, where interconnectivity is the norm, routers act as custodians of business information. These devices, which can sometimes be undervalued, control data traffic between our devices and the global network. However, recent events have highlighted vulnerabilities that may affect a large number of routers, raising concerns about the protection of sensitive information handled by enterprises.

Phishing with Cloudflare Workers: Transparent Phishing and HTML Smuggling

Netskope Threat Labs is tracking multiple phishing campaigns that abuse Cloudflare Workers. The campaigns are likely the work of different attackers since they use two very different techniques. One campaign (similar to the previously disclosed Azorult campaign) uses HTML smuggling, a detection evasion technique often used for downloading malware, to hide the phishing content from network inspection.

What is SQL Injection? SQLI Prevention and Mitigation

SQL Injection is a kind of cyber-attack based on targeted databases by submitting malicious SQL code instead of input on web application fields. This code is created with the purpose of affecting the structure of the database query that the application interacts with the backend database, thus making it vulnerable to hackers who can breach its security, modify data or carry out malicious actions.

Cato Networks' Impact and analysis of CVE-2024-3661 - "TunnelVision" VPN vulnerability

On May 6th, 2024, researchers from the Leviathan Security Group published an article detailing a technique to bypass most VPN applications, assigned as CVE-2024-3661 with a High CVSS score of 7.6. Researchers have labeled this technique ‘decloaking’ as while the VPN tunnel remains connected, it allows attackers to trick many VPN clients into sending traffic via a side channel and not through the encrypted tunnel.

Mitigating Data Poisoning Attacks on Large Language Models

Large language models (LLMs) have experienced a meteoric rise in recent years, revolutionizing natural language processing (NLP) and various applications within artificial intelligence (AI). These models, such as OpenAI's GPT-4 and Google's BERT, are built on deep learning architectures that can process and generate human-like text with remarkable accuracy and coherence.

Transform Collaboration with the Power of Egnyte and Microsoft Copilot in Microsoft Teams

As part of our ongoing partnership and investment in Microsoft, we have deepened our integration with Microsoft's Copilot within Microsoft Teams. This integration expands Copilot's capabilities by incorporating Egnyte as an additional data source. Microsoft 365 Copilot users can now derive valuable insights from documents stored in Egnyte, enhancing the usefulness of both Egnyte and the Microsoft Copilot solution for joint customers.

Enterprise Management Associates Report: Information Security and Compliance Future Trends 2024

The cybersecurity industry has seen radical changes over the past year–changes that may alter the trajectory of the industry. In partnership with analyst firm Enterprise Management Associates (EMA), today Keeper announces Information Security and Compliance Future Trends 2024, a report that analyzes recent research and industry data to highlight key shifts in the cybersecurity industry and offer insights into current trends and future directions.