Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

The Importance of DevSecOps in Mobile Apps

Some of the biggest and most successful businesses around the globe adopt a security-first strategy right from day one to ensure sustainability in growth. Regarding scalability, faster time to market, or competitive advantages, security must sit right at the top of business strategy. Security ensures that regular business operations and innovations remain uninterrupted pre or post-production.

Deduplicate Vulnerabilities with the Nucleus Platform's New CVEs Page

Vulnerability management is often a complex task, particularly when using multiple scanning tools or dealing with the constant flow of new CVEs. Different scanners can uncover the same vulnerability but provide different insights or look at different metadata, making it look like one vulnerability is several without the proper context. We are excited to introduce the Nucleus CVEs Page, designed to enhance how your organization manages vulnerabilities across projects.

Weekly Cyber Security News 03/10/2024

Let’s catch up on the more interesting vulnerability disclosures and cyber security news gathered from articles across the web this week. This is what we have been reading about on our coffee break! Ouch! Now this is an incredible revelation and I ‘doff my hat to them: Using the word ‘hallucinations’ is so funny, yeah, I’ve seen some really weird things AI comes up with that I question what has the machine been taking.

A strategic guide to implementing attack surface monitoring

As cyber threats evolve, the importance of attack surface monitoring has never been clearer. In today’s interconnected world, businesses face an unprecedented level of exposure. From web applications and cloud infrastructure to employee credentials and third-party SaaS integrations, your digital footprint offers numerous entry points for potential attackers.

How to Increase Business Security with a Zero Trust Approach

Traditional cybersecurity protocols quickly become out of date as cyberattacks and criminals evolve. Organizations are constantly on the lookout for new measures to prevent these attacks and keep their business and client data secure. This is why the zero-trust security principle is rapidly being adopted by organizations everywhere to help them save millions in data breach costs, which hit an all-time high of $4.88 million in 2024.

Saudi Arabia's PDPL

Saudi Arabia's Personal Data Protection Law (PDPL), enacted in 2021, marks a significant step in regulating the processing of personal data in the Kingdom. The PDPL aims to protect individuals' privacy by setting out clear rules on how personal data can be collected, processed, stored, and shared. As more businesses undergo digital transformations, the PDPL holds companies accountable for safeguarding data and ensuring transparency in their handling of personal information.

Cybercriminal Gang Targeting SMBs Using Business Email Compromise

Researchers at Todyl have published a report on a major cybercriminal group that’s conducting business email compromise (BEC) attacks against small and medium-sized businesses. Todyl describes three separate BEC attacks launched by this threat actor. In one case, the attackers compromised a Microsoft 365 account belonging to an individual working at a small non-profit.

New VPN Credential Attack Goes to Great Lengths to Obtain Access

A new “so-phish-ticated” attack uses phone calls, social engineering, lookalike domains, and impersonated company VPN sites to gain initial access to a victim network. This is one of the most advanced initial access attacks I’ve seen. Security analysts at GuidePoint Security have published details on a new attack that tricks users into providing the attacker with credentialed access.

Six Key Measures for Upholding Election Security and Integrity

Decision 2024 – the ultimate election year – is in full swing, with more than 60 countries holding national elections this cycle. In the United States, where presidential candidates are polling neck and neck and stakes are high, this “first true AI election” has brought election security to the forefront of the conversation.

Millions of Kia Vehicles Exposed to Remote Hacks via License Plate: The Growing Risk of Automotive API Vulnerabilities

In an increasingly connected world, the lines between digital security and physical safety are rapidly blurring. The automotive industry, now more reliant on connectivity than ever before, faces a new wave of cybersecurity threats. Millions of Kia vehicles, ranging from the 2013 model year to 2025, were recently found to be vulnerable to remote hacking via license plate information.