Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Securing Continuous Integration and Delivery Pipelines

Modern software development teams will have individual preferences about whether to use IDEs or which testing framework or coding convention to adopt. However, for teams that want to deliver high-quality software at a rapid pace, continuous integration and continuous delivery (CI/CD) is a must-have. Mature, high-performing dev teams lean heavily on their CI/CD pipeline. Because of this heavy dependence on CI/CD, ensuring the security of your CI/CD pipeline is incredibly important.

New Bumblebee Loader Infection Chain Signals Possible Resurgence

Bumblebee is a highly sophisticated downloader malware cybercriminals use to gain access to corporate networks and deliver other payloads such as Cobalt Strike beacons and ransomware. The Google Threat Analysis Group first discovered the malware in March 2022 and named it Bumblebee based on a User-Agent string it used. The Netskope Threat Labs team discovered what seems to be a new infection chain leading to Bumblebee malware infection, and our findings corroborate those shared by other researchers.

Emerging AI Use Cases in Healthcare: A Comprehensive Overview

The integration of AI, especially Gen AI, into healthcare has been transforming the industry, enabling providers to enhance patient care, streamline operations, and reduce costs. Below is an overview of the most promising AI use cases in healthcare that are reshaping the industry.

How to Safely Integrate LLMs Into Enterprise Applications and Achieve ISO 42001 Compliance

Enterprise applications, whether on-premise or in the cloud, access LLMs via APIs hosted in public clouds. These applications might be used for content generation, summarization, data analysis, or a plethora of other tasks. Riscosity’s data flow posture management platform protects sensitive data that would otherwise be accessible to LLM integrations.

Phishing Attacks Are Abusing Legitimate Services to Avoid Detection

Microsoft warns that threat actors are abusing legitimate file-hosting services to launch phishing attacks. These attacks are more likely to bypass security filters and appear more convincing to employees who frequently use these services. “Legitimate hosting services, such as SharePoint, OneDrive, and Dropbox, are widely used by organizations for storing, sharing, and collaborating on files,” Microsoft says.

Ekran System Is Now Syteca

We’re excited to announce that at long last, our highly anticipated brand refresh is complete: Ekran System Inc. is now officially Syteca Inc.! Our new name reflects the evolution of our product and our growth as a trusted provider, delivering the capabilities needed to enhance your organization’s cybersecurity. The same team behind Ekran System now brings you the Syteca platform: a more powerful and flexible software solution to meet your unique cybersecurity needs.

Ransomware Readiness: 10 Steps Every Organization Must Take

At the end of every year, the Trustwave content team asks its in-house experts what cybersecurity topics they predict will be top of mind in the coming 12 months, and inevitably the top answer is more ransomware. Instead of waiting an extra couple of months, we thought why not get ahead of the curve, pretend that ransomware will again be an issue, because it will, and proceed to the part of the story where we go through the problem and mitigation methods.