Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

IT admins are just as culpable for weak password use

New data from Outpost24 reveals that IT administrators could be just as predictable as end-users when it comes to passwords. An analysis of just over 1.8 million passwords ranks ‘admin’ as the most popular password with over 40,000 entries, with additional findings pointing to a continued acceptance of default passwords.

Keep Your Software Update Routine Strong

Software is an essential part of our online experience. Whether it’s our operating systems, web browsers, or the apps we use daily, software plays a crucial role in our lives. However, with great convenience comes a big responsibility, and one of the most essential aspects of online safety is keeping your software updated regularly. In this blog, we’ll explore the significance of keeping your software up-to-date.

Considering Passwordless? Here's How to Do It

When creating a new password, you know the drill – it must be at least eight characters long, contain special characters and avoid sequential characters or be based on dictionary words. Although these requirements can be a pain in the neck and seriously hamper end user experience, they are not a sign of officious IT security teams.

The IR Retainer Redefined: Boosting Cyber Resilience with MDR + Cyber Risk Retainer

An effective detection and response capability is essential for monitoring key assets, containing threats early and eradicating them. However, due to the current disparate nature of potential attack vectors within an organization, affording the wide range of sensors necessary can be a challenge as well as the worry of the disruption of critical services. Yet, without robust detection and response processes, businesses are left vulnerable.

How to Ensure the Security of Mobile Gadgets

The security of our mobile gadgets is more important than ever due to the volume of mobile devices we carry, wear, and work with daily. Our mobile devices are a gold mine of apps that we rely on to protect our data and help us in our personal and work lives. Nevertheless, it is because of the vast amount of data and information we hold on these devices that makes them a target for cybercriminals.

Seamless Collaboration in Life Sciences: A Key to Success

Biotech companies face an era of opportunities and challenges as data volumes explode and technology rapidly evolves. The pressure to enhance collaboration and efficiently manage data is immense. This article explores how innovative biotechs leverage platforms like Egnyte to transform their operations.

HTTP/2 Rapid Reset Attack Vulnerability

Google, Amazon Web Services & others recently disclosed a vulnerability in HTTP/2 protocol, which is being tracked as “CVE-2023-44487”. The flaw lies in how the HTTP/2 protocol was implemented to increase the efficiency of transmitting various messages between endpoints by “Stream multiplexing”.

Cisco iOS XE Vulnerability: CVE-2023-20198

Cisco has released an advisory, acknowledging active exploitation of a previously unknown vulnerability, which is tracked as CVE-2023-20198, in the web UI feature of Cisco IOS XE Software when exposed to the internet or to untrusted networks. This vulnerability allows a remote, unauthenticated attacker to create an account on an affected system with privilege level 15 access, which is the highest level of access.

Elevating Enterprise API Security with Wallarm for MuleSoft Anypoint Platform

In an age characterized by digital transformation, APIs serve as the backbone of modern applications, enabling diverse systems to communicate and share data seamlessly. This widespread API adoption, however, exposes organizations to a considerable attack surface, inviting the attention of cyber adversaries searching for vulnerabilities to exploit.