Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Background Screening Services: The Technological Revolution in Automated Digital Identity Verification

Imagine a world where the act of verifying an individual’s identity is as effortless as a mere click, yet it possesses the depth and thoroughness of the most detailed manual inspection. This is the reality shaped by digital identity verification, a groundbreaking process that has dramatically transformed the landscape of background screening. In this digital epoch, the accuracy and speed of identity verification have been catapulted to unprecedented levels.

How Automated Risk-Based KYC Works

Know Your Customer (KYC) isn’t merely a regulatory requirement; it’s the linchpin of financial integrity and security. In an era where fraudulent activities and money laundering schemes are increasingly sophisticated, KYC stands as the first line of defense. It serves a dual purpose: safeguarding financial institutions from becoming unwitting accomplices in illegal activities and protecting the economy at large from financial crimes.

The PCI DSS Compliance Checklist for 2024 [XLS Download]

If you recently took a relaxing European vacation and flew Air Europa, check your credit card statement. They are the latest victim of a malicious hack exposing customer credit card numbers, expiration dates, and even the associated stored CCV codes—which contradicts Payment Card Industry Data Security Standard (PCI DSS) regulations.

What is data-centric security?

Data is the lifeblood of organizations. It drives decision-making, fosters innovation, and underpins business operations. However, this wealth of data is scattered across multiple cloud platforms, making it an attractive target for cybercriminals, and rendering traditional approaches to data protection obsolete. This is where data-centric security comes into play. This article will explore the concept of data-centric security, why businesses need it, and the benefits it offers.

How To Fight Long-Game Social Engineering

CISA sent out a warning about a Russian advanced persistent threat (APT) called Star Blizzard warning about their long-game social engineering tactics. They create fake email and social media accounts, contact their potential victims, talk about a non-threatening subject to gain the victim’s confidence, and wait to launch their malicious attack. I call this long-game social engineering.

Undercover Threat: North Korean Operatives Infiltrate U.S. Companies Through Job Platforms

Researchers at Nisos warn that North Korean threat actors are impersonating skilled job seekers in order to obtain remote employment at US companies. “The identified personas claim to have highly sought-after technical skills and experience and often represent themselves as U.S.-based teleworkers, but Nisos investigators found indications that they are based abroad,” the researchers write.

Phishing Remains the Most Common Attack Technique, With Malicious URL Use Increasing 144%

Analysis of nearly a year’s worth of emails brings insight into exactly what kinds of malicious content are being used, who’s being impersonated, and who’s being targeted. I love data built on statistically relevant data samples, as the larger the data set, the more relevant and representative of an entire industry, country, or world it is. One such report is Hornetsecurity’s just released Cyber Security Report 2024.