Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Blogs

PII vs. SPI: Key Differences and Their Importance

Personal Information (PI) encompasses any data that can identify an individual, either directly or indirectly. This includes basic information such as names and addresses. It also includes more specific details like Social Security Numbers (SSN) and biometric data. Understanding the difference between Personally Identifiable Information (PII) and Sensitive Personal Information (SPI) is crucial for effective data protection.

What is API Security for Mobile Apps? Why Is It Important?

Businesses have gone mobile-first, and with good reason—people are spending more time and more money on their phones than ever before. For instance, in 2023, an estimated 66% or 2/3rds of all online orders were made from mobile devices. And in 2024, businesses are expected to spend $402 billion on mobile advertising. Mobile apps have become the first choice for users for their online activities in banking, e-commerce, media streaming, social media, etc.

Nearly All Ransomware Attacks Now Include Exfiltration of Data...But Not All Are Notified

Organizations are falling victim to ransomware attacks where data is stolen, but the victim isn’t being told about it. I have a theory as to why this is happening. Many assume data is being exfiltrated as part of a ransomware attack and it’s going to be used as part of the extortion component of the attack. But according to Arctic Wolf’s The State of Cybersecurity: 2024 Trends Report, that doesn’t seem to be the case.

QR Code Phishing is Still on the Rise

Organizations need to be aware of the threat posed by QR code phishing (quishing), according to researchers at Trend Micro. “Phishing emails continue to be the number one attack vector for organizations,” the researchers write. “A QR code phishing, or quishing attack, is a modern social engineering cyber attack technique manipulating users into giving away personal and financial information or downloading malware.

IoT: Internet of Threats?

The Internet of Things (IoT) has slowly but surely weaved its way into our homes and places of work. From smart homes to industrial control systems, IoT has brought convenience and efficiency to our lives. However, with this increased connectivity we have increased our risk. The IoT Attack Surface IoT devices are often designed with functionality in mind, rather than security. This means that many devices have weak or default passwords, unpatched vulnerabilities, and insecure communication protocols.

Cato Networks Surpasses $200M ARR and 2,500 Customers: Here's Why

When Cato Networks was launched and we onboarded our first customers, we were exhilarated to share the disruptive innovation that has turned into an incredible opportunity. Enterprises had become too complex, with many point solutions requiring assessment, integration, deployment, and maintenance. Cato was the remedy to that complexity.

Avoiding downtime: modern alternatives to outdated certificate pinning practices

In today’s world, technology is quickly evolving and some practices that were once considered the gold standard are quickly becoming outdated. At Cloudflare, we stay close to industry changes to ensure that we can provide the best solutions to our customers. One practice that we’re continuing to see in use that no longer serves its original purpose is certificate pinning.

CVE-2024-6327: Critical RCE Vulnerability in Progress Telerik Report Server

On July 24, 2024, Progress published a knowledge base article disclosing a critical vulnerability (CVE-2024-6327) impacting Telerik Report Server, a product by Progress designed for streamlined report management within organizations. This vulnerability can lead to remote code execution (RCE) due to the deserialization of untrusted data. Arctic Wolf has not identified a publicly accessible proof of concept (PoC) exploit or active exploitation of this vulnerability. However, most notably.