Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Blogs

Mary Calam Joins The Cyber Helpline as Trustee

Mary had a long career in the UK government, working in senior roles in a range of agencies across counter terrorism, national security and law enforcement, including the Independent Police Complaints Commission and the Serious Organised Crime Agency. Her last executive role was as Director General for Crime, Policing and Fire in the Home Office.

Improving Patch and Vulnerability Management with Proactive Security Analysis

Vulnerability management is the continuous process of identifying and addressing vulnerabilities in an organization’s IT infrastructure, while patch management is the process of accessing, testing, and installing patches that fix bugs or address known security vulnerabilities in software applications. Vulnerability management and patch management are crucial SecOps processes that protect IT assets against cyber threats and prevent unauthorized access to secure systems.

New Malware Campaign Impersonates AI Tools To Trick Users

Researchers at ESET warn that malvertising campaigns are impersonating AI tools to trick users into installing malware. The Rilide infostealer, for example, is being distributed via a malicious browser extension posing as Sora or Gemini. “In the case of the malicious browser extension, it is delivered to victims who have been duped into clicking on malicious ads, typically on Facebook, that promise the services of a generative AI model,” the researchers write.

The Curious Case of the Payroll Pilfering

In a world where cyber espionage has become as common as a rainy day in London, the recent events surrounding the UK armed forces' payroll database have had us all raising our eyebrows higher than a butler's in a posh British drama. The plot twists in the world of cybersecurity often reminds me of a Bond film, albeit with fewer martinis and more malware.

June Release Rollup: Egnyte for Microsoft (MS) Teams - Drag and Drop Functionality, Enhancements to Document Room Portal and More

This month's product updates and enhancements rollup includes Egnyte for MS Teams - Drag and Drop functionality, enhancements to the Document Room Portal, and user management on the Android mobile app. Please visit the articles linked below for more details.

Rubrik and Nutanix Extend Partnership to Enhance Security for Nutanix Cloud Clusters (NC2) on AWS and Azure

Cyber threats pose a significant risk to virtualized infrastructure. According to the latest Rubrik Zero Labs report, 83% of encrypted data across all industries is within a virtualized architecture. Virtualized architectures typically have less security coverage than traditional endpoints. This creates security dead spots and consequently allows attackers unfettered access.

How to Conduct Comprehensive Security Audits Without Compromising on Time?

Ever wondered how to conduct security audits without wasting time? Security audits are crucial for protecting your business from threats. But they often feel like they take forever. The process can be overwhelming, especially if you’re trying to be thorough without sacrificing too much time. Luckily, it doesn’t have to be this way.

California's Top 5 Cybersecurity Companies

In a developing digital environment, cybersecurity is playing an important role for safeguarding private information and maintaining the integrity of online systems. Strong cybersecurity measures are necessary for individuals, corporations, and governments to prevent data breaches, financial loss, and privacy violations because of an increasing number of cyber threats.

regreSSHion: RCE Vulnerability in OpenSSH Server (CVE-2024-6387)

A high-severity remote code execution (RCE) vulnerability has been found in OpenSSH’s server (CVE-2024-6387) by the research team of Qualys. This issue is especially concerning because it brings back a problem that was originally fixed in 2006, showing that one of the most popular secure software still has hidden bugs. This discovery follows another major vulnerability found in the XZ Utils library just a few months ago, highlighting ongoing security challenges.