Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Iranian Threat Actor Charming Kitten Using Spear Phishing Campaign To Distribute Malware

The Iranian threat actor Charming Kitten is launching sophisticated spear phishing attacks to distribute a new version of its POWERSTAR malware, according to researchers at Volexity. “In the last few years, Volexity has observed threat actors dramatically increase the level of effort they put into compromising credentials or systems of individual targets,” Volexity says.

HTML Files Top the List as the Most Commonly Used Malicious Attachment

As executables and scripts are unable to bypass security solutions as attachments, cybercriminals turn to HTML as a means of obfuscation and malicious execution. According to analysis from security vendor Avanan, executables and Office documents as malicious attachments are almost non-existent – thanks to the solid efforts on the part of security companies and Microsoft.

Thousands of American and Southwest Airlines Pilots Exposed by Third-Party Breach

American Airlines and Southwest Airlines are both known for offering a long list of destinations throughout the United States and some other parts of the world. Two of America's largest airlines just suffered from a data breach that threatens to expose new pilots and cadets joining and hoping to join the airlines.

TrustCloud Product Updates: June 2023

Coming soon TrustCloud’s New Platform Experience Get ready for a new and improved homepage that gives you a high-level snapshot of your compliance program, risks, employee compliance, automation status, and audit preparedness—all without toggling between apps. See a sneak peek. Coming soon Ask questions, get answers in TrustCloud Forums We created FlightSchool to help you learn about our products, GRC, and trust. Now, you can join the conversation with FlightSchool Forums!

Android Malware Outbreak: Unmasking the RAT Inside a Screen Recording App

With the worldwide popularity of Android and its open-source software, hackers have an increased incentive and opportunity to orchestrate attacks. A Google search for “Android malware” brings up headlines like these, all from the past few days or weeks: SecurityScorecard recently analyzed a specific threat known as the AhMyth RAT (remote access trojan), which made headlines for infiltrating a popular screen recording app on the Google Play Store.

Securing Privileged Access in a Remote Work World: Challenges and Best Practices

In today's disconnected world, the task of managing privileged access has become increasingly challenging. The surge in remote work has exposed employees to new vulnerabilities as they access sensitive systems and data from unsecured networks and personal devices, making them attractive targets for cyberattacks. To combat these risks, organizations must adopt Privileged Access Management (PAM) solutions.

Building a security-conscious CI/CD pipeline

Continuous integration (CI) and continuous delivery (CD) has become a ubiquitous practice for DevOps teams. The CI/CD process focuses on building and deploying new applications or releasing updates to already-deployed workloads. As a result, most CI/CD efforts focus on enhancing development speeds. However, CI/CD practices can accomplish much more than enabling workload deployments.

The importance of verifying webhook signatures

Webhooks are a callback integration technique for sending and receiving information, such as event notifications, in close to real-time. Webhooks can be triggered by application events and transmit data over HTTP to another application or third-party API. You can configure a webhook URL and connect external participants to customize, extend, or modify workflows. Webhooks may or may not be signed.

Announcing the Open-Source Reliability Leaderboard: A New Resource for Preventive AppSec

We are excited to announce the inaugural edition of the Mend.io Open-Source Reliability Leaderboard! Powered by data from Renovate, the wildly popular open-source dependency management tool, the Leaderboard presents the top packages in terms of reliability across three of the most widely used languages.

GitProtect v. 1.5.1 Features Forever Incremental, SLA Reports, Archiving User Logs

We present to you the new version of GitProtect – 1.5.1, and along with it… the long-awaited backup plan scheme – Forever Incremental! Amongst the novelties, you can also notice the SLA Reports for improved security control, log archiving, and several other enhancements aiming to speed up the app’s operation.