Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What's the Cheapest Way to Comply with HIPAA Online Tracking Technology Rules?

The U.S. Department of Health and Human Services (HHS) clarified in 2022 and again in 2023 that tracking technologies like Meta Pixel and GA4 can expose Protected Health Information (PHI). This applies even if PHI isn’t explicitly shared—contextual data such as appointment searches or logged-in status on a patient portal can qualify.

A Beginner's Guide to Ransomware-as-a-Service (Raas)

Over the last few years, news reports around ransomware attacks have noted that the attacks are increasingly sophisticated. Simultaneously, they say that the attackers are less sophisticated than in the past. While these two statements appear to conflict with each other, they are both true when viewed through the lens of the current cybercriminals business models.

What Is Smishing?

Text messages used to be a safe space—quick birthday wishes, delivery updates, maybe the odd emoji from a friend. But in today’s digital world, not every ping on your phone is innocent. Some are traps, carefully crafted to trick, scare, or confuse. One of the sneakiest tricks out there? Smishing. Yep, it’s a mashup of “SMS” and “phishing.” If phishing is the scam that hides behind a shady email, smishing is its text-based cousin.

Prevent Social Engineering Attacks: A Practical Guide Using Contextual Threat Intelligence

According to Zoho Workplace, organizations struggle to protect themselves as spam makes up 45% of all emails. These sophisticated threats deliberately exploit human psychology. Attackers convince people to bypass security measures, which leads to unauthorized access to the system. Standard defense mechanisms alone cannot curb these evolving threats. This blog explores how organizations can prevent social engineering using contextual threat intelligence and real-time behavioral analysis.

One Year Later: Reflecting on Building Resilience by Design

The one-year anniversary of July 19 marks a moment that deeply impacted our customers and partners and became one of the most defining chapters in CrowdStrike’s history. The incident impacted systems globally, and we responded with urgency and focus. That day reinforced the responsibility we’ve always carried as guardians of our customers’ digital infrastructure and trust.

Stop Remote Ransomware Attacks with Falcon Endpoint Security

Ransomware is a rapidly evolving threat, with attackers increasingly turning to remote techniques that target network shares. To help defend against these tactics, CrowdStrike Falcon Prevent endpoint security includes a capability called File System Containment, which is precision-focused to block malicious file system actions over Windows Server Message Block (SMB) shares, halting encryption as soon as possible.

Trustwave Launches Managed Phishing for Microsoft Service

Phishing remains the number one method attackers use to gain initial access to organizations. That makes your workforce the front line of defense and your ability to identify, neutralize, and respond to phishing attempts is more critical than ever. Trustwave’s Managed Phishing for Microsoft is a service designed specifically for organizations leveraging Microsoft Office 365 and Defender for Office (E5 or equivalent).

Can Git Restore a Deleted File?

Git, as a version control system, is very popular nowadays. Developers often make mistakes or encounter errors, such as accidentally deleting files. It is convenient not just because you can do many different operations with it, including such git commands as git revert, git push, git reset, git rebase, or many more. But it can also permit you to restore deleted files. Developers can recover from these mistakes using Git’s tools. Fortunately, for us, Git really has the right tools to do so.

Elevating data security: Ingest data from an Azure Event Hub secured by Entra ID

If you’re just here for the practical example, skip ahead. Are you still relying on static connection strings or shared access signature (SAS) keys to protect your sensitive data streams in Azure Event Hubs? While convenient, these methods can introduce security vulnerabilities. This blog demonstrates a more secure and modern approach.