Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Introducing DataTrails Proof Portal: A New Era in Media Authenticity with Imatag

In a world where digital content can be easily manipulated, ensuring the authenticity of media has never been more critical. DataTrails, in collaboration with Imatag, is proud to introduce Proof Portal, the first durable content protection solution combining leading provenance and transparency technology with digital fingerprints and invisible watermarks to authenticate content and defend against modified images and deepfakes.

February 24, 2025 Cyber Threat Intelligence Briefing

February 24, 2025 Cyber Threat Intelligence Briefing This week’s briefing covers: KTA080 (CL0P) Update CL0P has again updated their data leak site with a new list of redacted victim organizations possibly linked to the Cleo vulnerability. The list contains company names beginning with the letters E-H. This follows the current pattern the group has established with releasing redacted names to then later slowly start releasing the actual entity and published data associated with it if the victim organization has not reached out to CL0P.

Network Traffic Analysis for Data Exfiltration Detection - How Can It Be Done?

“Cybersecurity is much more than a matter of IT; it’s a matter of national security.” – Barack Obama. Data breaches are more than simply an IT concern; they may cause significant financial losses, regulatory fines, and reputational damage. Cybercriminals are always devising new ways to steal sensitive data, making it difficult for security teams to detect and mitigate these threats before they cause serious harm. This is where Network Traffic Analysis (NTA) comes in.

Why Immutable Backups Are Essential for Data Security in DevOps

Immutable backups (IB) are a robust defense mechanism against the consequences of cyberattacks. The latter can be considered an “evolving constant,” while DevOps environments closely link development and operations. IT teams adopt CI/CD pipelines and centralized applications utilizing multi-cloud deployment. And that usually translates into a growing attack surface (check 2024 DevOps Threats Unwrapped).

Protecting the Manufacturing Sector from Ransomware

The manufacturing sector has long been a favorite target for ransomware actors. However, the true scale of the issue has only recently become apparent: research published in Infosecurity Magazine last December revealed that ransomware attacks on manufacturing companies have caused an estimated $17bn in downtime since 2018. But why is the manufacturing sector so vulnerable? And what can organizations do to protect themselves? Keep reading to find out.

Making Sense of Australia's New Cybersecurity Legislation

Late last year, Australia’s Cyber Security Act 2024 received Royal Assent and became Law. It was a huge moment for cybersecurity legislation in Australia, serving as the country’s first-ever standalone cybersecurity law, addressing key legislative gaps, and bringing the country in line with international best practices. But what’s included in the Act? And what does it mean for businesses? Keep reading to find out.

Malware as a Service (MaaS): The New Frontier of Cybercrime

Cybercrime has rapidly evolved, and one of the most dangerous models that has emerged in recent years is malware as a service (MaaS). This criminal business model allows anyone without advanced programming knowledge to deploy highly effective malware campaigns by paying a subscription or a one-time fee. MaaS democratizes access to malicious tools and amplifies both the quantity and sophistication of cyberattacks.