Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

A Comprehensive Guide to Building Your Shopify Store

Shopify stands as one of the foremost platforms for creating and managing e-commerce stores, with over 1.75 million merchants utilizing its services across 175 countries. While Shopify offers robust features to facilitate store management, overlooking critical details during the setup phase can lead to significant challenges. To help your online store thrive, our Shopify Plus development agency has put together an extensive checklist outlining essential steps for long-term success.

Use these simple rules to detect common attacker tools

One of the most powerful weapons at an attacker’s disposal is the use of specialized tools designed to compromise network security. Mimikatz, BloodHound, and winPEAS are just a few examples of tools that can wreak havoc in your environment if left undetected. In this article, we’ll explore how malicious actors can exploit specialized tools to launch sophisticated attacks.

Discover DDI solutions to optimize port terminal operations

In today’s fast-paced global trade environment, the strategic value of a seaport is no longer determined solely by its geographical location or proximity to industrial hubs. Instead, the ability to leverage advanced technologies to boost operational efficiency and remain competitive is the defining factor. This shift in value is increasingly recognized across the maritime industry, as ports seek innovative digital solutions to manage complex logistics.

ZTNA vs VPN - Whats the Best Security Solution?

Work from home (WFH) remains a common practice for many businesses worldwide. This working model has enabled companies to hire top talent across borders, boost revenue, and improve employees work-life balance. A new report by Tata Consultancy Services (TCS) claims that, by 2025, 40% of employees around the world will work from home. However, this growing trend also brings about a range of cybersecurity risks that could impact businesses significantly.

Assessing and Prioritizing Risk in Your Infrastructure

There are lots of hurdles to jump when trying to set up and maintain a SIEM. Preparing infrastructure and installing the software components, getting logs ingested into the system, parsing and normalizing those log messages properly, configuring alerts for detection, etc. These are all large tasks that require thoughtful planning and a lot of work to get right. But let’s say you’ve managed to clear all those hurdles…in that case, great job!!

AWS Launches Improvements for Key Quarantine Policy

Recently, AWS expanded the scope of their AWSCompromisedKeyQuarantine policies (v2 and v3) to include new actions. This policy is used by AWS to lock down access keys that they suspect have been compromised. A common example of this process in action is when AWS automatically applies the quarantine policy to any keys found by scanning public GitHub repositories. This proactive protection mechanism can stop compromises before they happen.

Not All Synthetic Data is the Same: A Framework for Generating Realistic Data

A common misconception about synthetic data is that it’s all created equally. In reality, generating synthetic data for complex, nuanced use cases — like healthcare prescription data — can be exponentially more challenging than building a dataset for weather simulations. The goal of synthetic data isn’t just to simulate but to closely approximate real-world scenarios.

Linux Kernel effected by CVE-2023-2163

CVE-2023-2163 is a critical vulnerability in the Linux Kernel, specifically affecting kernel versions 5.4 and above (excluding 6.3). This vulnerability arises from incorrect verifier pruning in the Berkeley Packet Filter (BPF), leading to unsafe code paths being incorrectly marked as safe. The vulnerability has a CVSS v3.1 Base Score of 8.8, indicating its high severity. The consequences are arbitrary read/write in kernel memory, lateral privilege escalation and container escape.

Financial Services Industry Experiences a Massive Increase in Brand Abuse

Industry analysis of the domains used behind phishing and brand impersonation attacks show financial institutions are being leveraged at an alarming rate. It’s one thing to see your industry at the top of some “state of” cybersecurity report, but it’s entirely different to learn that 68% of all phishing web pages identified in a single quarter are from your industry. That’s exactly what we find in Akamai’s latest analysis of websites across the Internet.

All in on flexible and efficient integrations

Our users secure products and services developed by dozens of distributed technical teams. They rely on tools like Detectify to prioritize and triage vulnerability findings onward to development teams to remediate. This process is anything but straightforward, which is why we’re excited to see our users utilize our integration platform in ways that help them work efficiently alongside their tech teams.