Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Squash Scattered Spider Attacks with Forward Networks' Blast Radius

I hate spiders, a lot. But I really hate the idea of a Scattered Spider Attack which can jump between environments that you may have believed were segmented at an alarming rate. That is the stuff of real nightmares for networking and security professionals. Keeping up with your security posture isn’t easy. We’re all doing our best, but is it good enough? One CISO we talked to hired a consulting firm to map out their security posture.

12 Christmas Scams to Watch Out for This Holiday Season

On the twelfth day of Christmas, my true love gave to me... hopefully something better than a virus (computer or otherwise). As the end of the year is fast approaching, it has not been without its fair share of data breaches, hacks, and even the return of digital piracy. As we enter December and fast approaching the most wonderful time of the year, hackers, cybercriminals, and online fraudsters are looking to end the year with a bang.

CyberLink Breached Through Supply Chain Attack By North Korean Hackers

Recently, the Microsoft Threat Intelligence Team has discovered a supply chain attack executed by North Korean attackers. The prime victim of this attack was CyberLink, a multimedia software company headquartered in Taiwan. This strategic infiltration in the CyberLink infrastructure impacted globally present customers, risking data integrity and confidentiality.

Different Types of Windows 10/11 Updates You Must Know

Whether it’s an application or an operating system, every software needs an update to optimize performance, align with trends, and fulfill dynamic user requirements. The same is the case with the Windows 10/11 operating system. Microsoft, the developer of Windows OS, releases several updates for its product. In this blog, you will get to know about each one of them thoroughly. So, let’s get started by understanding the process behind it.

What is a Malicious Code? How Can an Organization Protect Against Malicious Code?

In today’s digital era, billions of online data and information are processed on the web. Individuals, businesses and organizations actively rely on the web network. With such huge reliance on the digital network, it is evident that malicious code poses a high risk to the systems and information processed. There are many types of malicious code, trojans and viruses that affect the networking system across the globe. Did you know?

Penetration Testing Software vs. Human Expertise: Finding the Right Balance

Penetration testing remains a crucial element in cybersecurity, providing organizations with the proactive means to identify and address security vulnerabilities long before they become opportunities for malicious actors. More than 75% of businesses perform pen-testing either to maintain their security posture or due to compliance reasons.

Understanding DNS-Based Threats and How They Impact Your Business

Cybersecurity, DNS (Domain Name System), and your company are interconnected topics in the field of network security. Protecting a company’s cybersecurity, including its DNS infrastructure, is of utmost importance in today’s digital landscape. DNS is responsible for translating user-friendly domain names into machine-readable IP addresses, allowing devices to communicate with each other over the internet.

November Release Rollup: Location Triggered Access Notifications in The Egnyte Android App, Audio/ Video Search and More

This month's release rollup for product updates and enhancements includes location triggered access notifications in the Egnyte Android App, Audio/ Video Search, and user management on mobile. Below is a summary of these and other new releases. Visit the articles linked below for more details. Featured Platform Enhancements and Releases Location Triggered Access Notifications in The Egnyte Android App: Streamlines accessing Project Folders within the app when users are near the project location.