Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is EV Code Signing & Its Impact on Enterprises? [Guide]

Extended Validation (EV) Code Signing certificate is an advanced digital signature. It protects software developers’ and publishers’ codes, content, scripts, and other digital objects in their software and online applications from malicious attacks. EV Code Signing provides next-generation security and trusts to the customers by signing their software. The software publishers and developers must undergo stringent verification and inspection to obtain EV Code Signing Certificate.

Top 3 Ways to Win at Player Onboarding and KYC

For online gaming, player onboarding and Know Your Customer (KYC) processes are critical components of player engagement, retention, and compliance. Effective onboarding ensures that players can easily and quickly start playing games, while KYC helps protect operators from fraud, money laundering, and underage gambling. However, these processes can also create friction for players, leading to drop-offs and abandonment.

FedEx Phishing Campaign Abusing TrustedForm and PAAY

Netskope Threat Labs is tracking a phishing campaign that mimics a FedEx package delivery as bait to steal credit card data. This type of social engineering attack is commonly found in phishing pages, emails, and other scams, where a false sense of urgency is created to urge the victim into doing an action that eventually leads to personal data theft.

5 Common Vulnerabilities Associated With Remote Access

After COVID, enterprise IT security got turned on its head. As the world adjusted to working from home, and continues to, IT teams worked overtime to enable remote access for millions of employees. This transition has gone smoothly for most organizations, but many security gaps still remain years later. The SolarWinds data breach is a worrying example. It shows how vulnerable organizations are to malicious activity in our changing risk environment.

Counting the seconds: a method of showing automation value

Automation has revolutionized the way cybersecurity functions. Not only has it led to significant time savings, but it has also improved the consistency and accuracy of various processes. Here, we will discuss how to effectively record the time saved from automation to demonstrate its value. Tines offers great utilities to easily record the time an analyst has saved by automating manual, repetitive tasks over the course of a day, right down to the second.

New .NET Malware "WhiteSnake" Targets Python Developers, Uses Tor for C&C Communication

The JFrog Security Research team recently discovered a new malware payload in the PyPI repository, written in C#. This is uncommon since PyPI is primarily a repository for Python packages, and its codebase consists mostly of Python code, or natively compiled libraries used by Python programs. This finding raised our concerns about the potential for cross-language malware attacks.

Software Supply Chain Security at RSA Conference 2023

The risk of supply chain attacks increases as more companies rely on third-party vendors and suppliers for critical services and products. Supply chain attacks have become increasingly prominent in recent years. In 2022, for instance, supply chain attacks surpassed the number of malware-based attacks by 40%.

Hackers Backdoor to Microsoft SQL Servers using Trigona ransomware

South Korean cyber security organisation AhnLab has identified a breach in Microsoft SQL servers allowing deployment of Trigona ransomware. The attacks were threat actors using brute-force or dictionary attacks with obtained or guessed credentials to infiltrate externally accessible MS-SQL servers.

More than 256,000 Consumers Put at Risk By the Consumer Financial Protection Bureau

The Consumer Financial Protection Bureau (CFPB) is a government agency that's tasked with protecting consumers from financial institutions. The agency mostly works to prevent companies from charging outrageous fees and surcharges to customers, but it helps with monitoring how consumer data is being used by companies as well.