Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Work Management Company NSC Tech, Suffers 50k Employee Record Breach

NSC Technologies is a workforce management solution pairing perfect prospective candidates with companies desiring long-term employees. NSC has more than 30 locations nationwide, with the majority in Indiana. They are reportedly a 1% performing acquisition staffing firm; that may change following their recent data breach.

Weekly Cybersecurity Recap November 24

This week, the cybersecurity environment continued to be rocked by the global MOVEit data breach. Various Stanford Health groups had information taken in the MOVEit event, up to 1.6 million patient records. AutoZone also announced MOVEit’s involvement in a 185,000-person security incident. Delaware Life Insurance suffered a similar breach from MOVEit, although the number of records lost remains unknown.

Why you need a Secure Web Gateway

In today's hyper-connected digital landscape, where the flow of information is incessant, ensuring the security of your online activities has never been more crucial. Enter the Secure Web Gateway (SWG) – a formidable guardian standing sentinel at the crossroads of the internet, offering protection against cyber threats.

Black Friday phishing emails up 237%

Black Friday and Cyber Monday are highlights in the cybercriminals’ calendars, leading to a spike in the number of related phishing attacks. Between November 1st – November 14th, 2023, we've detected a 237% increase in phishing emails relating to Black Friday and Cyber Monday versus the period between September 1st – October 31st, 2023. We predict that this will increase in the run up to this year’s Black Friday and Cyber Monday.

The Art of Chrome Extension Development: A Comprehensive Guide (Without Code) Introduction

Google Chrome, a highly popular web browser globally, boasts an array of functions and capabilities that elevate the browsing experience. Notably, it allows users to craft bespoke extensions. These extensions can tweak and amplify the browser's performance to suit individual requirements, whether for increased productivity, entertainment, and more.

Enterprise Software Security: Challenges and Best Practices

In an age where digital information is critical, enterprise software security is more important than ever. As organizations increasingly rely on complex software systems to manage their operations, the risks and vulnerabilities associated with these systems are growing. This article examines the key challenges in enterprise software security and outlines best practices for mitigating these risks.

How Cybercriminals Use the Dark Web to Undermine Security

Major search engines merely scratch the surface, exploring 4% of the vast web. Concealed within the deep web, the dark web emerges as a hub for cybercriminal activities. This covert digital underworld operates anonymously outside conventional browsers, providing an ideal haven for cybercriminal coordination beyond law enforcement's grasp.

The human element - cybersecurity's greatest challenge

The stark reality of cybersecurity today isn't merely a question of advanced software or strategic counterattacks. It's about people. The financial impact is undeniable with cybercrime costs projected to reach an astonishing $10.5 trillion annually by 2025. Yet, beneath these figures lies a more pressing issue: the exploitation of human psychology. According to Verizon's 2023 Data Breach Investigations Report (DBIR), 74% of all breaches involve the human element, including social engineering attacks, errors, or misuse, while half of all social engineering attacks feature pretexting incidents - which is almost double from the year before.

PCI Compliance Levels: A Developer's Guide to PCI Compliance

Compliance is something that developers dislike. Traditionally led by risk and information security teams, compliance standard enforcement in organizations is not something software engineers are trained to do. So when the words “PCI compliance” are tossed around, for many developers it mentally translates to limitations, guardrails, bottlenecks, and drastic changes to their workflows that impact productivity. But that doesn’t have to be the case.