Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Blogs

Mobile apps for healthcare: how the future of medicine is changing

Mobile applications and services in the healthcare industry have completely changed the way users approach monitoring their health. This trend opens up a lot of opportunities for both developers and end users of digital products. The healthcare mobile app development market is already setting its own trends and vision for the future of medicine.

How to Choose a Payment Gateway Software Development Company?

In today's rapidly evolving digital world, having a reliable and secure payment gateway is crucial for any business. Whether you run a bustling e-commerce store or a growing SaaS platform, the ability to process payments smoothly can make or break your operation. With so many choices available, finding the right payment gateway software development company is no small feat. It's not just about selecting a vendor; it's about finding a partner who understands your unique needs and can deliver a solution that aligns with your business goals.

Key Strategies for Strengthening Cybersecurity in 2024

Imagine a world where your online security is rock-solid, your data is as safe as a locked vault, and cyber threats can't get through. Sounds ideal, right? In 2024, this level of security is more achievable than ever. With the right strategies, including ensuring cybersecurity compliance, you can turn cybersecurity from a constant concern into one of your biggest strengths.

On The Hunt for Hunters Ransomware: Origins, Victimology and TTPs

Amid the disruption of the Hive ransomware group by law enforcement agencies, Hunters International emerged onto the cyber scene in Q3 of 2023, displaying notable technical similarities with Hive, hinting at an evolutionary progression or branch-off from the dismantled group. This transition underscores the adaptive nature of cybercriminal networks, persisting in their illicit activities despite law enforcement actions.

From MLOps to MLOops: Exposing the Attack Surface of Machine Learning Platforms

NOTE: This research was recently presented at Black Hat USA 2024, under the title “From MLOps to MLOops – Exposing the Attack Surface of Machine Learning Platforms”. The JFrog Security Research team recently dedicated its efforts to exploring the various attacks that could be mounted on open source machine learning (MLOps) platforms used inside organizational networks.

Threat Context monthly: Executive intelligence briefing for August 2024

Welcome to the Threat Context monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news and threat information from KrakenLabs, Outpost24’s cyber Threat Intelligence team. Here’s what you need to know from August.

This New Wi-Fi Attack Can Intercept Data Traffic

The growing complexity of networks and connected devices makes implementing effective cybersecurity an increasingly complicated task. While businesses have shown more awareness of the need to elevate their security posture in recent years, several fundamental cyber hygiene issues still need to be addressed.