Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What You Need to Know About the October OKTA Breach

Okta, a provider of identity and authentication management services, reported that threat actors were able to access private customer data by obtaining credentials to its customer support management system. According to Okta’s Chief Security Officer, David Bradbury, the threat actor had the capability to view files uploaded by specific Okta customers in recent support cases.

Cybersecurity Power Plays: Product Pairings for Stronger Security

In sports, the most successful teams master the art of strategic combinations. The same is true within the cybersecurity arena. In today’s expanding and complex threat landscape, trying to beat cyber opponents with a starting lineup of disparate point solutions is a losing strategy. How much better would your cyber defenses be with correlated threat intelligence across each of your key security solutions?

A Brief History of Phishing, and Other Forms of Social Engineering

Social engineering attacks have a very long history, though the Internet has made it easier to launch these attacks en masse, according to Sean McNee at DomainTools. McNee points to an advance-fee scam from 1924, in which a crook sent a letter pretending to be trapped in a Spanish debtors prison. The sender requested that the recipient send a check for $36,000 to pay off his debt. After the sender is freed, he promises to pay the recipient back, with an extra $12,000 for the trouble.

Web Application Penetration Testing Checklist

The proverb, “A stitch in time saves nine,” encapsulates the core of web application security. Businesses must always be one step ahead of attackers and malicious actors to identify vulnerabilities, weaknesses, and misconfigurations in web applications and ensure they are patched and/or fixed before attackers can find and leverage them to orchestrate attacks.

Software Testing Strategies and Approaches for Successful Development

Just Imagine! You have just downloaded a highly anticipated mobile application that promises to simplify your daily tasks. You have heard positive reviews about its functionality and efficiency. As you eagerly tap on the app icon, your excitement turns into frustration. Glitches, crashes, unexpected errors, etc., greet you at every turn. This frustrating experience is a stark reminder of the critical role software testing plays in our digital lives.

Business continuity planning: Looking back or ahead

In September 2023, cybercriminals launched an extensive ransomware attack that disrupted several major businesses in the Las Vegas Casino Business/District. The attack shook the city and stopped consumer goods and services for several hours. The attack influenced security, visitor services, and financial activities. Businesses lost money and long-term reputational risks ensued.

Blockchain Security: Understanding vulnerabilities and mitigating risks

In recent years, blockchain technology has garnered significant attention thanks to its remarkable tamper-proof features and robust security. It is also expected that the blockchain technology market will exceed 1.2 billion US dollars by 2030, with an annual growth rate of 82.8 percent. However, recent headlines have exposed numerous vulnerabilities and cyberattacks targeting blockchain technology.

Cyber Insurance Report: Breach Frequency Down, Breach Severity Up

The past half-decade has been a particularly tumultuous one for cybersecurity. It has borne witness to some of the most damaging attacks in history, unprecedentedly high data breach rates, and a staggering number of emerging threat groups. However, a new report from cyber insurance provider Coalition suggests that things are beginning to stabilize.