Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Almost 2 Million Patients Exposed By Apria Healthcare Data Breach

Apria Healthcare is a healthcare equipment provider that works with more than 2 million patients annually. The company offers services in more than 280 different locations in the United States and specializes in home healthcare equipment. This organization has a significant number of employees and maintains health and personal data for employees and patients throughout the course of providing services to customers.

May Product Innovation: Updates for BIM Files, Connected Folders, and More

‍ We are pleased to share some exciting advancements made to our platform this month. These include the introduction of folder-scoped and file type-scoped Metadata, the addition of connected folders for Desktop App Core on Mac, and significant improvements to BIM Files search and preview features. Please explore the details below for more information.

Understanding FedRAMP System Boundaries

In the ever-changing world of technology, staying secure is a top priority for many organizations. Identifying and documenting system boundaries is essential for keeping data safe and secure, but what does this mean? In this article, we’ll explore system boundaries, how to identify them, and how to generate system boundary diagrams. By the end of this guide, you’ll be well-versed in understanding system boundaries and creating diagrams that can help keep your information secure!

The Unseen Risks of Open Source Dependencies: The Case of an Abandoned Name

One often-overlooked risk in the bustling ecosystem of open-source software are vulnerabilities introduced through software dependencies. We mention this because today, a malicious actor took over a RubyGems package name with more than two million downloads. Mend.io technology detected the package before it could be used for an attack, but the case of ‘gemnasium-gitlab-service‘ serves as an important reminder of the risk of neglecting dependency management.

Reverse-Engineering Java and JavaScript Malware

Most malware security researchers encounter in the wild is written in C or C++. These languages provide low-level system access and control, plus performance, allowing threat actors to create highly efficient and stealthy code. But that doesn’t mean cybercriminals are limited to those two languages. SecurityScorecard recently reverse-engineered the Vjw0rm worm written in JavaScript and the Java-based STRRAT remote access trojan (RAT).

Expanding Enterprise Attack Surfaces (EAS) and the increasing importance of Identity & Access Management

In the past five years, Enterprise Attack Surfaces (EAS) have evolved significantly. EAS refer to the various entry points that cybercriminals can exploit to gain unauthorized access to an organization's digital assets. With the increasing use of cloud-based services, the proliferation of connected devices and the growing reliance on third-party vendors, attack surfaces have become broader, more numerous and more complex.

Who's Who in Cloud Security? CSPM, CIEM, CWPP & CNAPP Explained

Cloud Native Application Protection Platforms – or CNAPP solutions – are steadily gaining traction as the best solutions to address Cloud Native security. Regardless of your cloud adoption maturity (whether you’re PoC-ing some services in the cloud, running a few applications, or fully embracing this new era), We’re sure you have likely already noticed that cloud-native security is different from IT-managed data center security. But how exactly is it different?

What is DORA? How to prepare your business for compliance

Designed to support the digital resiliency of financial institutions in the EU and UK, the Digital Operational Resilience Act is set to go in effect in January 2025. In this blog, we take a deep dive into what organizations must do in order to be compliant with this new legislation. Digital resiliency is one of the financial sector's most significant challenges today.