Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

NEW: ARMO Platform Introduces Auto-Generation of Seccomp Profiles

We are thrilled to announce the latest enhancement to ARMO Platform: Seccomp Profiles Leveraging eBPF. This feature uses eBPF to take the guesswork out of creating seccomp profiles. Thus, benefiting from the added security seccomp profiles provide, without the risk of “breaking” applications.

A Deep-Dive Into Initial Access Brokers: Trends, Statistics, Tactics and more

Initial Access Brokers (IABs) are threat actors who infiltrate networks, systems, or organizations and sell this unauthorized access to other malicious actors. Instead of executing the entire cyberattack, IABs focus on the initial breach and monetize it by selling access to compromised systems. They assist ransomware operations, particularly RaaS schemes, by streamlining attacks and reducing workload at the start.

"It's so important that the CISO gets a seat at the table": a Q&A with Trace3's Gina Yacone

A leading voice in cybersecurity, Gina Yacone is a trusted advisor to senior security leaders, guiding them through emerging trends and recommending strategies to strengthen defenses. She was also recently named Cybersecurity Woman Volunteer of the Year 2024. As regional and advisory CISO at the elite technology consultancy Trace3, she also participates in the Trace3 AI Center of Excellence (CoE) Champion Program, keeping her at the forefront of AI and security innovation.

One AppSec Platform. One Price.

������ ������������ ����������������.������ ����������. Application security is necessary – our platform makes it effortless Mend.io's proactive platform finds and fixes vulnerabilities before they hit your codebase with a new unified AppSec platform.

Shifting From Reactivity to Proactivity in AppSec with Phil Guimond - Secrets of AppSec Champions

"In Episode 03 of the SAC | Secrets of AppSec Champions podcast titled ""Compromised: Proactive to Reactive,"" hosts Chris Lindsey and guest Phil Guimond tackle the critical distinctions between proactive and reactive security strategies. They emphasize the importance of access logging and visibility in detecting compromises early, pointing out how changes in access logs can signal potential threats. They stress the necessity of implementing secure, tamper-proof log storage and discuss automation solutions like the ""Have I Been Pwned"" API and CAPTCHA to mitigate risks such as account takeovers.

Verkada Penalized $2.95M by FTC for Security Failures Exposing 150,000 Camera Feeds

In a significant development in the cybersecurity domain, the Federal Trade Commission (FTC) has proposed a $2.95 million penalty against security camera vendor Verkada. The penalty stems from multiple security failures that allowed hackers to access live video feeds from 150,000 internet-connected cameras. These breaches exposed sensitive environments, including women's health clinics, psychiatric hospitals, prisons, and schools, highlighting the severe implications of inadequate security measures.

Critical Vulnerabilities in Microsoft macOS Apps Could Lead to Unrestricted Access for Hackers

In a recent cybersecurity development, eight vulnerabilities have been identified in Microsoft applications for macOS. These flaws could potentially allow attackers to gain elevated privileges or access sensitive data by bypassing the operating system’s permissions-based security model. This blog delves into the nature of these vulnerabilities, their potential impact, and the steps that can be taken to mitigate the risks.

The Human Factor in Cybersecurity: Behavioral Insights and Mitigation Strategies

Whether it's clicking on a malicious link or being duped by social engineering tactics, people can unintentionally open the door to significant security breaches for organizations of all sizes. These mistakes aren’t inevitable or limited to any one role—they can happen to anyone, from top executives to customer service reps—but they are preventable with the right knowledge and constant vigilance in place.

A look into Web Application Security

In today's digital age, web applications are the backbone of many businesses, supporting and managing a vast array of sensitive information, from personal details and financial records to critical business data. When we think about any company that we want to know more about, the most common question is: “what is their website”? But web applications are not just about traditional websites, they encompass far more than just the pages you go to when browsing the Internet.