Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Attackers Abuse DocuSign API to Send Authentic-Looking Invoices At Scale

In a concerning trend, cybercriminals are leveraging DocuSign's APIs to send fake invoices that appear strikingly authentic. Unlike traditional phishing scams that rely on deceptively crafted emails and malicious links, these incidents use genuine DocuSign accounts and templates to impersonate reputable companies, catching users and security tools off guard.

CVE-2024-10443: Critical Zero-Click RCE Vulnerability Discovered in Synology NAS Devices

On November 1, 2024, details of a critical vulnerability affecting Synology NAS devices, which had been patched a few days earlier, were publicly disclosed. This vulnerability, tracked as CVE-2024-10443 is classified as a zero-click flaw, meaning no user interaction is required for exploitation. The issue originates from the SynologyPhotos application, which comes pre-installed and enabled by default on Synology’s BeeStation storage devices and is also widely used among DiskStation users.

Leveling up the 1Password Developer experience

The 1Password desktop apps now include the option to show a dedicated developer section, accessible from the sidebar. The next time you open 1Password for Mac, Windows, or Linux, the built-in SSH Agent, 1Password CLI, and Developer Watchtower will be a click away.

Office 365 DLP: Securing Your Data with Data Loss Prevention

Data breaches happen every day, so companies need to make data security a top priority to keep private data safe and make sure they follow the rules. Data Loss Prevention (DLP) in Office 365 is a powerful tool that finds, monitors, and protects sensitive data across all platforms. This makes an organization's security stronger. Office 365 DLP helps businesses keep private data from being shared or exposed without permission.

Understanding the Impact of the NIS2 Directive on Managed Service Providers (MSPs)

With cybersecurity threats on the rise, regulatory bodies are taking robust measures to secure essential infrastructure. The European Union’s introduction of the NIS2 Directive marks a significant step in this direction, aiming to fortify the defenses of critical sectors across Europe. Managed Service Providers (MSPs) play a pivotal role in safeguarding networks and information systems, and the new NIS2 requirements underscore the heightened responsibilities they face.

How to Prevent Ransomware on Networks: Proven Strategies for Protection

Organizations around the world are increasingly vulnerable to ransomware attacks, expected to cause over $20 billion in damages by the end of 2024. These cyber attacks are capable of shutting down entire networks, disrupting services, and inflicting severe financial and reputational damage. Knowing how to prevent ransomware on networks is essential in safeguarding against these dangers.

Seven Use Cases for Remote Browser Isolation (RBI)

It’s important to know that not all Remote Browser Isolation (RBI) solutions address the same use cases. Some use cases a good RBI solution solves include monitoring third-party access to systems, auditing browser activity, enabling secure Bring Your Own Device (BYOD) and extending zero trust to browsers. Continue reading to learn what RBI is and explore some of its most common use cases.

A Critical Look at Modern PAM Capabilities

In today’s digital landscape, Privileged Access Management (PAM) has evolved beyond rotating and vaulting privileged credentials for long-lived systems. As organizations expand cloud investment and scale sustainable hybrid work, PAM has also grown into a multi-faceted discipline that must secure all identities across the enterprise.