Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Uncovering the dark web: What is it and who uses it?

The dark web is the seedy underbelly of the internet. Unlike the surface web, criminals, spies, freedom fighters, and hacktivists can operate anonymously on the dark web, making it a popular place for illicit activity. Legitimate internet users also use it to protect their privacy in a world where people are increasingly mistrustful of digital giants like Google and Facebook. But it’s very easy to accidentally view illegal, dangerous, and traumatizing material on the dark web.

RSA Conference 2022: Netacea's highlights

Last week Netacea team members from the UK and across the US converged at RSA Conference, the biggest event in the cybersecurity calendar, at the Moscone Center in San Francisco. It was a pleasure to talk to so many likeminded security professionals at our booth, and an honor to be given a speaking session from which to spread the word about automated threats.

Cybersecurity Sessions #8: MFA is better than passwords... Right?

We’re told that multi-factor authentication is more secure than passwords, but in truth most MFA is susceptible to the same old threats, such as phishing and man-in-the-middle attacks. In fact, the widely championed advice to “use MFA, any MFA” could lead to a false sense of security and even more data breaches.

MFA is better than passwords... Right? | Cybersecurity Sessions #8 with Roger Grimes

We’re told that multi-factor authentication is more secure than passwords, but in truth most MFA is susceptible to the same old threats, such as phishing and man-in-the-middle attacks. In fact, the widely championed advice to “use MFA, any MFA” could lead to a false sense of security and even more data breaches. In this episode, Andy sits down with Roger Grimes (Data-Driven Defense Evangelist, KnowBe4) to find out why MFA is vulnerable to exploitation, whether some MFAs are better than others, and what the future of secure authentication might look like.

Interactive Phishing: Using Chatbot-like Web Applications to Harvest Information

Phishing website links are commonly delivered via email to their respective targets. Once clicked, these websites often show a single webpage that outright asks for sensitive information like account login credentials, credit card details, and other personally identifiable information (PII). Recently, we have encountered an interesting phishing website containing an interactive component in it: a chatbot.

AI in Cybersecurity - A Double-Edged Sword | Cybersecurity Sessions #7 with Elaine K. Lee

It’s likely that we encounter artificial intelligence more often than we realize. Just as AI can be used to facilitate fraud and spread misinformation via deepfakes and sophisticated identity theft, it can also be used to develop algorithms that detect cyber-attacks in the blink of an eye. In this episode of the Cybersecurity Sessions, Andy is joined by Elaine Lee (Data Scientist, Mimecast) to delve into the benefits and risks of AI in cybersecurity, examining how artificial intelligence can be used both as an offensive weapon by adversaries and by security teams to defend against attacks.

Why it is Vital to Mitigate and Manage Bot Threat

Data from a recent report revealed that bots take up two-thirds of the internet traffic. However, not all bots are safe and well-intentioned. Research further suggests that of in all of the web traffic, nearly 40% is bad bot traffic and around 25% is good bot traffic. Given how destructive bad bots are, it is essential to use a bot protection solution to detect bad bots, manage bot traffic, and mitigate bot threats. Read on to know more about bot protection solutions and how they help organizations.

The Bot Problem Why is it Necessary to Mitigate Bot Threats

Data from a recent report revealed that bots take up two-thirds of the internet traffic. However, not all bots are safe and well-intentioned. Research further suggests that of in all of the web traffic, nearly 40% is bad bot traffic and around 25% is good bot traffic. Given how destructive bad bots are, it is essential to use a bot protection solution to detect bad bots, manage bot traffic, and mitigate bot threats. Read on to know more about bot protection solutions and how they help organizations.