Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Cyber Awareness Challenge 2024: Building a Culture of Security

In this digital age, where technology is so important to our daily lives, it's more important than ever to keep our online presence safe. Cyber threats are getting smarter, so you need to be cautious and know what you're doing when it comes to cybersecurity. Because this is so important, the Cyber Awareness Challenge 2024 is being held to help people and businesses develop a mindset of security.

Dark Web Monitoring Services: Protecting Your Business from Hidden Threats

There are many threats that businesses have to deal with, and some of them hide in the dark web. People who belong to this secret part of the internet are known for doing illegal things like selling stolen data, malware, and fake goods. Businesses need to put in place strong security measures to protect their private data and image. Dark web monitoring services are an important part of this process.

Don't Put Real Answers Into Your Password Reset Questions

This recent article on how a hacker used genealogy websites to help better guess victims' password reset answers made it a great time to share a suggestion: Don’t answer password reset questions with real answers! It’s not Jeopardy! You don’t have to answer the questions correctly. In fact, you’re putting yourself at increased risk if you do. Instead, give a false question to any required password reset answer.

Cybercriminal Gang Targeting SMBs Using Business Email Compromise

Researchers at Todyl have published a report on a major cybercriminal group that’s conducting business email compromise (BEC) attacks against small and medium-sized businesses. Todyl describes three separate BEC attacks launched by this threat actor. In one case, the attackers compromised a Microsoft 365 account belonging to an individual working at a small non-profit.

New VPN Credential Attack Goes to Great Lengths to Obtain Access

A new “so-phish-ticated” attack uses phone calls, social engineering, lookalike domains, and impersonated company VPN sites to gain initial access to a victim network. This is one of the most advanced initial access attacks I’ve seen. Security analysts at GuidePoint Security have published details on a new attack that tricks users into providing the attacker with credentialed access.

The Importance of DevSecOps in Mobile Apps

Some of the biggest and most successful businesses around the globe adopt a security-first strategy right from day one to ensure sustainability in growth. Regarding scalability, faster time to market, or competitive advantages, security must sit right at the top of business strategy. Security ensures that regular business operations and innovations remain uninterrupted pre or post-production.

An Introduction to Threat Monitoring

According to CIS, just in the first half of 2024, malware-based threats rose by 30% from 2023. A similar 30% year-over-year increase was also found in cyber attacks in 2024 in a report by Check Point Research. With such alarming statistics, it is evident that the need for threat monitoring has become more critical than ever before. In this blog post, we'll explore what threat monitoring entails, why it's essential, and how you can implement best practices to safeguard your business.

My CUPS Runneth Over (with CVEs)

The Common Unix Printing System (CUPS), a standard component in nearly every Unix-like and Linux system, has recently come under scrutiny due to a series of critical vulnerabilities discovered by security researcher Simone Margaritelli. These issues, collectively known as the CUPS vulnerability, expose Linux and Unix environments to potential remote code execution and information disclosure risks.

How to Add Azure Account as a Datasource

In this BDRSuite demo, I’ll guide you through adding an Azure Account as a Data Source in BDRSuite Backup Server.` BDRSuite provides robust protection for your Azure data, allowing you to back up and recover virtual machines, storage accounts, and other Azure resources efficiently. It supports flexible storage options, secure backups, and easy recovery processes.