Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Bringing Veracode Fix to GitHub

If you’re an avid reader of Application Security surveys, analyst papers, or incident reports, you may have concluded that the biggest issue most organizations have with application security is NOT finding the flaws in their codebase, but is, in fact, finding ways to remediate them while also creating new applications and updates, oh and keeping the lights on. Many organizations are drowning in security debt.

Top Privileged Access Management (PAM) Solutions for Secure Access

The privileged accounts in your IT environment require special attention because they have elevated access to vital systems and sensitive data. The organization can suffer severe damage if they are misused by their owners or compromised in attacks. In addition, many compliance standards require organizations to maintain tight control over privileged access. Most organizations have hundreds or thousands of accounts with privileged access.

The Rise of ZTNA: A Seamless Path to Remote Access

Working remotely using cloud applications is now the norm for getting things done. But while these shifts offer greater flexibility, they also bring new security challenges. For years, virtual private networks (VPNs) were the go-to solution for securing remote access. But when used at such a large scale, VPNs are inefficient, slowing users down and undoing the productivity gains that come along with remote work. Worse, they expose organizations to unnecessary security risks like lateral movement attacks.

Backup ESXi Host Configuration: 4 Different Methods

Virtualization offers several advantages for backup and recovery operations, which are the backbone of data protection, operational continuity, and availability. Most importantly, virtualization makes agentless and image-based, host-level backups possible. These types of backups can capture the full VM, including VM configuration as well as VM data. However, it’s important to protect hosts too, as healthy ESXi hosts are important for VMs to run properly.

Google App Scripts Become the Latest Way to Establish Credibility and Automate Phishing Attacks

Cybercriminals have found a new way of leveraging legitimate web services for malicious purposes, this time with the benefit of added automation of campaign actions. Security researchers at CheckPoint have discovered a new phishing campaign that uses Google App Scripts – a scripting platform developed by Google that lets you integrate with and automate tasks across Google products – as the destination in malicious links.

ISO 27001 - 2013 vs 2022: Changes, Transition & More

Information and digital security frameworks like FedRAMP, CMMC, and ISO 27001 are not static documents. They provide a static framework for your business to comply with and achieve, but that framework is only valid for so long. Several different forces are in play to ensure that the stipulations and security measures outlined in these frameworks remain valid over time.

Trinity Ransomware Targets the Healthcare Sector

The Trinity ransomware gang is launching double-extortion attacks against organizations in the healthcare sector, according to an advisory from the US Department of Health and Human Services (HHS). The ransomware gains initial access via phishing emails or software vulnerabilities. “Trinity ransomware was first seen around May 2024,” the advisory says.

The Mobile Phishing Boom and How to Avoid It

As mobile technology becomes integral to day-to-day life, fraudsters are refining phishing techniques to exploit vulnerabilities in mobile browsing. According to Zimperium’s 2024 zLabs Global Mobile Threat report, 82% of phishing sites specifically targeted mobile devices in 2023. To protect customer data, enterprises need to counter-adapt.

Nucleus Security Positioned as a Growth Leader in Frost Radar: Application Security Posture Management, 2024

In September 2024, Frost & Sullivan released its Frost Radar: Application Security Posture Management (ASPM), 2024, highlighting the leaders in this rapidly growing market. We’re proud to be recognized as a top player, reflecting our strong growth and impact in the ASPM space. Our customers use Nucleus to achieve a comprehensive and unified application security posture.