Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

[dot]US Domain Exploited for Phishing

The Interisle Consulting Group has published a paper looking at the phishing landscape in 2023, KrebsOnSecurity reports. Notably, Interisle found that the.us top-level domain is being widely abused in phishing attacks. “.US is the ccTLD of the United States and had a very large number of its domains used for phishing -- almost 30,000 domains, more than 20,000 of which were registered maliciously by phishers,” Interisle said.

Elevate load balancing with Private IPs and Cloudflare Tunnels: a secure path to efficient traffic distribution

In the dynamic world of modern applications, efficient load balancing plays a pivotal role in delivering exceptional user experiences. Customers commonly leverage load balancing, so they can efficiently use their existing infrastructure resources in the best way possible. Though, load balancing is not a ‘one-size-fits-all, out of the box’ solution for everyone.

Contextual Analysis for Python, Java, and JavaScript Projects with JFrog Frogbot

When scanning packages, CVE (Common Vulnerabilities and Exposures) scanners can find thousands of vulnerabilities. This leaves developers with the painstaking task of sifting through long lists of vulnerabilities to identify the relevance of each, only to find that many vulnerabilities don’t affect their artifacts at all.

Akamai Vs. Cloudflare WAF

Akamai, a pioneering WAF solution, retains its key position within the evolving WAAP landscape. As one of the earliest players in the CDN space, Akamai maintains its dominance in content delivery. Akamai’s App & API Protector combines a range of leading-edge technologies, including web application firewall, bot mitigation, API security, and DDoS protection, all within a user-friendly, unified solution.

What Is a Password Breach?

A password breach is when a cybercriminal has your password and is able to use it to get into your account. Password breaches can occur due to social engineering and insider threats, but most often, weak password habits are the culprit. Keep reading to learn more about how passwords get breached, what can happen if your passwords are breached and how to prevent password breaches from happening.

Exploring the TSA Pipeline Security Guidelines

Under the direction of the Department of Homeland Security (DHS), The Transportation Security Administration (TSA) secures transportation systems in the United States, including oil and natural gas pipelines. The TSA Pipeline Security Guidelines are recommended best practices that protect the over 2.7 million miles of pipelines transporting natural gas, oil, and other hazardous materials across the U.S. from physical and cyber threats.

Understanding the HITRUST CSF and its Benefits

The Health Information Trust Alliance Common Security Framework (HITRUST CSF) is a cybersecurity framework designed to help organizations meet regulatory compliance and risk management needs when dealing with sensitive and regulated data. The HITRUST CSF features a risk-based and compliance approach that integrates various regulations and standards. It also includes certification for compliance validation, providing an additional layer of trust for HITRUST-certified organizations.

An Overview of India's Digital Personal Data Protection Act (2023)

After years of debates, discussions, and negotiation delays, the Central Government of India published its Digital Personal Data Protection Act, 2023 (DPDP) on August 11, 2023. In its last week before being enacted, the Act rapidly passed throughout both houses of Parliament and was ascended into publication by President Droupadi Murmu. India is the 19th country within the Group of 20 (G20) to pass a comprehensive data protection law.

Evaluating & Managing Service Provider Security Risks (in 2023)

If you’re considering partnering with a service provider, it’s essential also to consider the security risks they could introduce to your organization. In this post, we outline the primary cybersecurity risks associated with service providers and provide tips for managing them to help you safely benefit from this strategy for reducing operational costs. Take a tour of UpGuard’s Vendor Risk Management solution >