Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

The Dell API Breach: It could have been prevented

As you may have seen in the news, a hacker stole 49 million customer records from Dell. The attack wasn’t novel or sophisticated. Instead, the attacker used a business logic flaw and an API to scrape 49 million records from Dell. How did they do it? Here is the attack flow. The attacker registered for an account within the Dell ecosystem to be a reseller/partner. They weren’t going to be. But Dell didn’t perform any checks, and within 48 hours, the attacker had a valid account.

Unlocking AI Ethics: The Brivo Approach to Transparency and Safety

In today's rapidly evolving digital landscape, the integration of artificial intelligence (AI) into our daily lives and businesses is inevitable. At Brivo, we're at the forefront of marrying technology with ethics, ensuring that our smart spaces and access control solutions are not just innovative but also transparent and safe. In this video, we dive deep into the importance of transparency in AI usage, highlighting how it forms the backbone of ethical AI practices.

7 Essential Tips to Prevent Social Engineering

Whereas traditional hacking exploits weaknesses in software or hardware, social engineering exploits weaknesses in the human psyche. By preying on people’s habits, fears, or complacency, attackers can gain access to almost any system, no matter how sensitive or well-protected. The ubiquity of personal mobile devices in the workplace has only exacerbated the threat.

8 out of 10 Organizations Experience a Cyber Attack and Attribute Users as the Problem

Regardless of whether your environment is on-premises, in the cloud or hybrid, new data makes it clear that users are the top cybersecurity concern, and we cover what you can do about it. According to Netwrix’s 2024 Hybrid Security Trends Report, 79% of organizations experience one or more security incidents in the last 12 months. This is a 16% increase from the previous year, demonstrating that attacks are not subsiding one bit and that they are increasingly successful.

Verizon: The Human Element is Behind Two-Thirds of Data Breaches

Despite growing security investments in prevention, detection and response to threats, users are still making uninformed mistakes and causing breaches. One of the basic tenets of KnowBe4 is that your users provide the organization with an opportunity to have a material (and hopefully positive) impact on a cyber attack. They are the ones clicking malicious links, opening unknown attachments, providing company credentials on impersonated websites and falling for social engineering scams of all kinds.

How to navigate the rapid changes and consolidation in the SIEM and security analytics market

The security solutions landscape is evolving at a breakneck pace, with significant acquisitions reshaping the market. Notably, Palo Alto Networks has acquired IBM's QRadar product line, and Exabeam and LogRhythm have announced their merger. These moves echo Cisco's previous acquisition of Splunk, highlighting a trend where major players like AWS, Microsoft, Cisco, Palo Alto Networks, and CrowdStrike are consolidating their positions in the SIEM and security analytics space.

What Is Email Spoofing and How to Prevent it?

Manipulating email headers to mimic the sender’s address and make people think they’re communicating with someone they know. This is a brief definition of email spoofing, an infamous fraudulent technique that can cause harm to recipients and those whose electronic addresses have been compromised. Spoofing may happen to individuals and companies alike.