Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Rise of cloud agnosticism: challenges and myths

In the evolving landscape of technology, cloud agnosticism has seen increasing traction. This refers to the ability to design and deploy applications seamlessly on any cloud platform, whether that be AWS, GCP, Azure, or others. Cloud agnosticism is essentially a design principle that advocates for flexibility, portability, and interoperability, allowing organizations to use multiple cloud providers without being tied to the services or infrastructure of any single one.

$9 million seized from "pig butchering" scammers who preyed on lonely hearts

US authorities have seized almost $9 million worth of cryptocurrency linked to a gang engaged in cryptocurrency investment fraud and romance scams. The US Department of Justice has announced that the seized funds are connected to cryptocurrency wallet addresses alleged to be associated with a "pig butchering" gang that has claimed over 70 victims around the world. "Pig butchering" is one of the world's fastest-growing types of scams.

Five things we love from the Total Economic Impact of Egress study

As part of our efforts to effectively quantify and demonstrate the return on investment (ROI) for our customers, Egress has commissioned Forrester Consulting to conduct a Total Economic Impact of Egress Intelligent Email Security study. As part of this study, Forrester interviewed and gathered data from four Egress customers. This data and the interviewees’ experiences were aggregated to create a composite customer organization – a financial services firm with 9,000 mailboxes.

Weekly Cyber Security News 23/11/2023

A selection of this week’s more interesting vulnerability disclosures and cyber security news. For a daily selection see our twitter feed at #ionCube24. Breaches are never timed well, and this one certainly isn’t before the return of the ever popular Black Friday sales storm. Be prepared for some scam emails from them as well as all the others. As always, check before you click! Talking of checking before you click…

Cato Application Catalog - How we supercharged application categorization with AI/ML

New applications emerge at an almost impossible to keep-up-with pace, creating a constant challenge and blind spot for IT and security teams in the form of Shadow IT. Organizations must keep up by using tools that are automatically updated with latest developments and changes in the applications landscape to maintain proper security. An integral part of any SASE product is its ability to accurately categorize and map user traffic to the actual application being used.

Changing how we think about technology - moving from logical to critical thinking

Knowledge is power, but it is only as powerful as the way organisations implement what they’ve learned and the subsequent decisions they make. All too often there is a flaw in thinking, in that we tend to be quite tactical and short-term; often we don’t approach problems from a holistic perspective, or we spend too little time considering alternative strategies.

Understanding Kubernetes secrets in a Kubernetes environment

As we know, in today’s era, most applications are deployed using Kubernetes. So that applications can function properly, and the users can use the applications without any issues. The applications sometimes require access to external resources, services or databases for processing or storing data. One of the most efficient ways of accessing sensitive data from other services is the secret object of the Kubernetes environment.

Understand all the Cyber Essentials requirements for IT infrastructure (April 2025 changes included)

Cyber Essentials is a government-backed scheme that helps businesses of all sizes protect themselves from common cyber threats. The scheme sets out five technical controls companies must implement to achieve certification. These controls protect against the most common cyber attacks, such as malware, phishing, and denial-of-service attacks.

Vehicle Number Check and RC Check Online: How to guide

You might be aware of the utility of an RC if you are a vehicle owner. When you register a new vehicle with the Regional Transport Office (RTO), the RTO issues you a Registration Certificate (RC) which contains comprehensive information about yourself, your vehicle, and other vital details, such as the termination of the validity of the certificate. Some of the details mentioned in an RC certificate & verified during an Vehicle Number Check.