Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What Is a Watering Hole Attack?

A watering hole attack is a type of cyberattack in which a threat actor targets an organization by hacking a website often visited by an employee in order to infect the employee’s device with malware. Once the device of one employee is infected, the threat actor targets other members of the organization and steals their confidential information.

What is a Remote Access Trojan (RAT)?

A Remote Access Trojan (RAT) is a type of malware that enables an attacker to gain remote access over an infected system. Once a machine is compromised by a Remote Access Trojan, your system is at high risk of covert surveillance, data exfiltration, and other methods of malicious remote compromise. This article defines what a Remote Access Trojan (RAT) is and how you can take action to protect your system with UpGuard BreachSight.

Simplifying Government Data Protection for Kubernetes with CloudCasa

In the realm of government institutions in Brazil, regional electoral courts hold a pivotal role in ensuring the integrity of the electoral process. These institutions are mandated to safeguard their essential electoral data through off-site backup solutions. While Kubernetes’ efficiency and flexibility hold great promise for modernizing operations, government data protection challenges have deterred many regional electoral courts from embracing this technology.

How to Choose the Right MSSP: 5 Essential Criteria

In an era where businesses rely heavily on technology and digital infrastructure, the need for robust cybersecurity measures has become paramount. Organizations are constantly under the threat of cyberattacks. To combat the evolving threat landscape effectively, many businesses turn to Managed Security Service Providers (MSSPs) for expert assistance. In this blog post, we will present you with five crucial criteria to confidently guide you through the MSSP selection process.

Vulnerabilities in Multi-Factor Authentication and How to Address Them

Multi-factor authentication is an authentication method that asks for two or more authentications from users to get access to a resource or any device. Multi-factor authentication is also known as two-factor authentication, or 2FA. Generally, hackers gain access to a single authentication, such as a password; however, it is quite difficult to break the two-factor authentication.

MOVEit Hackers Intercept Data and SSNs from Nuance Communications

Nuance Communications is a Microsoft-owned software solutions provider employing more than 6,500 people. Nuance controls industry-defining AI, which professionals may use to fully automate tasks, such as entering and manipulating medical records. Many of Nuance’s clients are hospitals, clinics, and health centers in the southeast of the US; those who have received medical services in these areas are now at risk following the most recent MOVEit data breach.

Understanding GDPR Vendor Management and Compliance for your Business

General Data Protection Regulation (GDPR) is a framework for data protection that gives strict obligations for organizations within the European Union. For many businesses, understanding and implementing GDPR vendor management is a daunting task. That’s why we are going to break down what GDPR vendor management is, who is involved in it, and what the requirements are.

How to Discover and Secure Open Port Vulnerabilities

Open port vulnerabilities pose a significant security risk to your organization. If left exposed, ports are a gateway for hackers to breach your network and steal your data. But what are open ports, why are they a security risk, and what can you do to close open port vulnerabilities? Let’s answer your open port questions.

Cyber Threat Modelling

Do you model Cyber Threats, depict likely attack scenarios via Attack Trees and provide those findings back in a succinct manner to those responsible for the risk(s)? Surely that’s for the proviso of large companies, with big budgets and oodles of staff? I hear you say… Perhaps, but any organisation large or small can start to model their Cyber Threats. Why?