Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Australia Enacts Landmark Cybersecurity Legislation: The Cyber Security Bill 2024

On October 9, 2024, the Australian government took a significant step in fortifying its cyber defenses by introducing the Cyber Security Bill 2024 to Parliament. This pioneering legislation marks the country's first standalone cybersecurity law, designed to enhance protections for both citizens and organizations amid escalating geopolitical and cyber threats. By implementing comprehensive measures, Australia aims to safeguard critical infrastructure and ensure a more secure digital environment.

Massive AI Call Center Data Breach: 10 million Conversations Leaked, Heightening Fraud Risks

In a significant breach, over 10 million customer conversations from an AI-powered call center platform in the Middle East have been exposed. This incident has raised alarm bells regarding the security vulnerabilities of AI platforms widely used in sectors such as fintech and e-commerce. As AI platforms become integral to business operations, the risks of compromised data tracking and brand impersonation have also escalated.

Outlook Bug Causes Global Disruptions: Microsoft Investigates Login Failures and High Memory Usage

Microsoft is currently investigating a significant issue affecting its Outlook desktop app, with users experiencing a range of problems, including crashes, high memory consumption, and login failures. Initially believed to impact only European users, the issue has now been reported by users globally, signaling a more widespread problem. In addition to the desktop app, some users have experienced similar issues while using Outlook on the web (OWA), making this a pressing matter for Microsoft to address.

Top Privileged Access Management (PAM) Solutions for Secure Access

The privileged accounts in your IT environment require special attention because they have elevated access to vital systems and sensitive data. The organization can suffer severe damage if they are misused by their owners or compromised in attacks. In addition, many compliance standards require organizations to maintain tight control over privileged access. Most organizations have hundreds or thousands of accounts with privileged access.

Understanding Common Ports Used in Networks for TCP and UDP Usage

Think of a port as a virtual gateway that a specific service, process, or application on your computer uses for network communication. Each port is assigned a unique number, allowing different types of traffic to be directed to the appropriate software. For example, your email might use one port, while your web browsing uses another. When combined with an IP address, a port number creates a complete socket address, enabling precise routing of data to and from your computer across the network.

GitProtect 1.8.5 release brings a big launch - Azure DevOps Backup and DR

We are so proud to announce that GitProtect Backup and Disaster Recovery for Azure DevOps is here! The 1.8.5 release also brings a few improvements – performance, UX, and more – and small fixes. Let’s dig into more details.

New Capability: Safeguard Your Sensitive Cloud Data With Rubrik Data Protection Insights

According to Cybersecurity Ventures, more than half of the world’s data will be stored in the cloud by 2025. With this growth comes a new challenge: understanding where your cloud data lives, what it contains, and how to ensure it is properly protected. The mass storage capabilities of the cloud means it’s easy to drop data wherever you want. It’s also easy to forget to clean up that data or set up backups where that data is required.

Backup ESXi Host Configuration: 4 Different Methods

Virtualization offers several advantages for backup and recovery operations, which are the backbone of data protection, operational continuity, and availability. Most importantly, virtualization makes agentless and image-based, host-level backups possible. These types of backups can capture the full VM, including VM configuration as well as VM data. However, it’s important to protect hosts too, as healthy ESXi hosts are important for VMs to run properly.

Trinity Ransomware Targets the Healthcare Sector

The Trinity ransomware gang is launching double-extortion attacks against organizations in the healthcare sector, according to an advisory from the US Department of Health and Human Services (HHS). The ransomware gains initial access via phishing emails or software vulnerabilities. “Trinity ransomware was first seen around May 2024,” the advisory says.

Google App Scripts Become the Latest Way to Establish Credibility and Automate Phishing Attacks

Cybercriminals have found a new way of leveraging legitimate web services for malicious purposes, this time with the benefit of added automation of campaign actions. Security researchers at CheckPoint have discovered a new phishing campaign that uses Google App Scripts – a scripting platform developed by Google that lets you integrate with and automate tasks across Google products – as the destination in malicious links.