Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Is October only for Halloween?

October is a busy month for awareness campaigns and Halloween! Perhaps you already knew that October is both Breast Cancer Awareness and Domestic Violence Awareness Month, but did you know it is also National Cybersecurity Awareness Month (NCSAM)? NCSAM is a government-created campaign in the United States. It is an initiative of the U.S. Department of Homeland Security (DHS) and the National Cyber Security Alliance (NCSA).

How to Get a Job in Cybersecurity by Leveraging LinkedIn

Landing a SOC job and breaking into the cybersecurity space can feel daunting. One way to set yourself up for success is to leverage professional social networking sites like LinkedIn. When used correctly, LinkedIn can be a powerful tool for growing your connections and landing your dream gig. Not sure how to get a job in cybersecurity by using LinkedIn? Here are some tips.

Demystifying the Dark Web and DarkNets, Part V-FINs, APTs, Rogues, Hacktivists, Cyber Warriors, and Accidentals

In our last installment of this series, we were introduced to some dangerous characters one might encounter on darknets. This week, we will finish out that list, looking into both organized groups and individuals. Wrapping my head around why people do what they do, and how they execute operations that end up costing corporations millions, is always fascinating.

Florida Courts Bleed Data Following Supposed BlackCat Ransomware Assault

Florida’s First Judicial Circuit hosts 33 courts in the Northwest of the state. The region serves over 1.4 million residents, most of whom live within areas heavily impacted by the military. Last week, the Florida Courts suffered a data breach, which halted operations across the district starting on October 2nd. In the last 72 hours, ransomware gang BlackCat has claimed responsibility for the assault—and may be holding the credentials for ransom.

Enhancing AKS Security with Microsegmentation

As organizations adopt Microsoft AKS at scale, they need to enforce namespace or even workload-based isolation for better security and compliance. This isolation, often referred to as microsegmentation, can help prevent the lateral movement of threats inside Kubernetes clusters, achieve compliance by limiting communication across workloads or namespaces, and enable multi-tenancy by limiting communication.

Thought your Node.js latest Docker image was safe?

For all developers who run containerized JavaScript workloads in production: Is relying on node:latest as your base image a safe choice? It's effective from a developer productivity standpoint as you're up and running quickly. Have you ever wondered if the image is secure? This blog post examines the potential security implications of using node:latest as your base image.

5 Reasons Why VPN is an Essential Utility for Internet Users

Imagine the internet as a big city. It's a place full of exciting destinations but also has its fair share of dark alleys. Now, imagine a VPN (Virtual Private Network) as your personal, digital bodyguard while you roam around this city. It keeps you safe, guards your privacy, and unlocks doors to places you never knew existed. Curious to take this security guard for a spin? You can try VPN for free and see the difference it makes. In this guide, we'll unveil five solid reasons why having a VPN by your side is a smart choice for any internet user.