Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Malicious "RedAlert - Rocket Alerts" Application Targets Israeli Phone Calls, SMS, and User Information

More than 5,000 rockets have been launched into Israel since the attacks from Hamas began on October 7th 2023. RedAlert - Rocket Alerts developed by Elad Nava allows individuals to receive timely and precise alerts about incoming airstrikes. Many people living in Israel rely on these alerts to seek safety - a service which has become increasingly important given the newest escalations in the region..

2023 OWASP Top-10 Series: Wrap Up

Over the past several months, we've taken a journey through the new 2023 OWASP API Security Top-10 list. In the previous 12 weekly posts, we've delved into each category, discussed what it is, how it's exploited, why it matters, and suggested effective protections for each. Now, as we conclude this series, it's time to summarize and offer some practical guidance for security practitioners looking to bolster API security in their organizations.

Check Stub Generators vs. Traditional Payroll Systems: Pros and Cons

In the business world, the tools you use for payroll can make a big difference. Payroll is how a company pays its employees, and there are two main ways to do it: using check stub generators or traditional payroll systems. This article will compare these two options to help you decide which is best for your business. Whether you're a small startup or a big multinational company, knowing the good and bad about these tools before you choose one is essential.

AWS Security Assessment - A Comprehensive Guide

AWS or Amazon Web Services is no new name in the tech industry. Given the extensive range of services it offers involving computing, storage, database, networking, and much more, it is extensively utilized by businesses worldwide. One majorly important domain where AWS has set a precedent is security. However, realizing the full potential of its efficient security model requires proper AWS security assessment.

How a Database Risk Assessment Reduces the Risk of a Cyberattack

Database security often, and to an organization's detriment, falls between the cracks as security and IT teams scramble to stay on top of daily cyber hygiene tasks and deal with the never-ending problems of running their network. The danger of overlooking their database, or to put it in, say, banking terms – the vault – is this is likely a threat actor's primary target. An organization's database is where IP, credentials, and financial information are stored.

Common Venmo Scams To Avoid

Common Venmo scams include phishing scams, offers of fake prizes and cash rewards, fake payments and more. The more aware you are of common Venmo scams, the better you can avoid falling for them and losing money. Continue reading to learn some of Venmo’s most common scams, what to do if you’re scammed on Venmo and how to stay safe when using Venmo.

KnowBe4 Named a Leader in the Fall 2023 G2 Grid Report for Security Orchestration, Automation, and Response (SOAR)

We are excited to announce that KnowBe4 has been named a leader in the Fall 2023 G2 Grid Report for Security Orchestration, Automation, and Response (SOAR) for the PhishER platform for the tenth consecutive quarter! The latest G2 Grid Report compares Security Orchestration, Automation, and Response (SOAR) Software vendors based on user reviews, customer satisfaction, popularity and market presence. Based on 228 G2 customer reviews, KnowBe4’s PhishER platform is the top ranked SOAR software.

Fortifying IoT Devices: Unraveling the Art of Securing Embedded Systems

Interconnected, data-enabled devices are more common now than ever before. By 2027, it is predicted that there will be more than 41 billion new IoT devices. The emergence of each new device offers a fresh vulnerability point for opportunistic bad actors. In 2022, there were over 112 million cyberattacks carried out on IoT devices worldwide. Without sufficient protection, attackers can exploit these weak points to gain access to sensitive data or restrict access to internet networks.