Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

The Rise and fall of Raccoon Infostealer: Inside a Global Cybercrime Operation

In the ever-evolving landscape of cybercrime, malware-as-a-service (MaaS) has emerged as a lucrative business for cybercriminals. One of the most notorious examples is Raccoon Infostealer, malware designed to harvest personal and financial information from unsuspecting victims worldwide. The mastermind behind this operation, a Ukrainian national named Mark Sokolovsky, recently pleaded guilty in a U.S. federal court to his role in the cybercrime network.

Protecting Your Business from Data Breaches and Cybercrime

In today’s digital age, companies across various sectors are increasingly vulnerable to cyber attacks. Among the most alarming tactics cybercriminals use is leveraging stolen data to launch targeted attacks on businesses. With this data in hand, attackers can craft sophisticated schemes to exploit vulnerabilities and cause serious harm to companies. Let's dive into the methods cybercriminals employ using stolen data and how it affects businesses like yours.

S3 Storage For DevOps Backups

Choosing S3 storage like AWS, Google Cloud, or Azure Blob Storage is a strategic choice. Especially as data volumes grow fast and disaster recovery strategies require more focus. Such an investment may reduce operational overhead and optimize costs. Then, new technical and economic perspectives follow. 99% of IT decision-makers state they have a backup strategy. And yet, 26% of them couldn’t fully restore their data when recovering from backups (according to a survey of Apricorn from 2022).

What Is a Modern Breach and How Can It Be Prevented?

In the modern world, data is a precious asset. That means malicious actors will go to great lengths to get their hands on your organization’s information — and if that information is in the cloud, it’s especially vulnerable to those outside forces. You likely have some cybersecurity measures in place, but are you prepared for modern breaches that use constantly evolving tactics to exploit vulnerabilities and gain access?

Remote Access Security: 5 Best Practices for Remote Workers

Remote and hybrid workplaces are here to stay. In August 2023, 20% of U.S. employees worked from home at least once. By 2025, more than 36 million U.S. employees will work remotely, up from 19 million in 2019. That’s good news for employers who want the widest talent pool and employees who want to do their best work from anywhere. However, it’s also potentially good news for cyber criminals, who can exploit remote access policies to compromise cloud data.

Tines for governance, risk, and compliance: Mastering GRC with workflow automation and orchestration

Unlock the secrets to staying ahead in the ever-evolving world of governance, risk, and compliance (GRC) in our upcoming webinar. In this webinar, we will share an overview of the current GRC landscape and the transformative potential of workflow automation and orchestration. During the webinar, we discussed: Whether you're a seasoned GRC professional or just beginning to explore workflow automation and orchestration, this webinar offers essential insights and actionable strategies to help you navigate the complexities of GRC in today's dynamic environment.

Choosing the Right Deployment Option for Your API Security Solution

You need an API security solution. That much is a given (although some may argue it isn’t!). While essential for business growth and innovation, APIs, or Application Programming Interfaces, expose the organizations that use them to cyber threats. Attackers are both aware of and actively exploiting this fact: Wallarm recently revealed that attacks on APIs impacted 98.35 million users in Q2 2024.

Disable Data Execution Prevention

Data Execution Prevention (DEP) is a Windows security feature that protects systems by preventing code from executing in memory areas designated for data storage. By ensuring only authorized programs can run in specific memory regions, DEP helps block malicious software, such as viruses, from executing harmful code. It operates at both hardware and software levels, monitoring memory usage to prevent exploits like buffer overflow attacks.

Cyber Essentials certification cost and related expenses: A detailed breakdown

The Cyber Essentials assurance scheme is one of the best accreditations you can obtain for improving your organization's cybersecurity posture and reducing the risk of cyberattacks. It offers a robust set of controls you can implement to fortify the security of your data, systems, and other IT assets and build greater trust with your stakeholders.

CVE-2024-47610: Stored XSS Vulnerability in InvenTree

Astra Security identified a vulnerability in the InvenTree Inventory Management System on October 2nd, 2024, which has since been patched. This vulnerability, CVE-2024-47610, is stored cross-site scripting (stored XSS) that targets versions of InvenTree below 0.16.5, where ‘Markdown,’ in the Notes feature, can enable attackers to run code. Cross-site scripting vulnerabilities allow a hacker to inject HTML code into an application and affect the users who intercept the code.