Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Every transaction tells a story: Protecting HPE NonStop ecosystems against AI-driven cyber threats

In a world where digital transformation is accelerating, the stakes for safeguarding critical infrastructure, government systems, and financial services have never been higher. These sectors are increasingly targeted by sophisticated payment fraud schemes and AI-powered cyberattacks, leaving them under immense pressure to shield their customers from threats.

Protecting Your Business from Data Breaches and Cybercrime

In today’s digital age, companies across various sectors are increasingly vulnerable to cyber attacks. Among the most alarming tactics cybercriminals use is leveraging stolen data to launch targeted attacks on businesses. With this data in hand, attackers can craft sophisticated schemes to exploit vulnerabilities and cause serious harm to companies. Let's dive into the methods cybercriminals employ using stolen data and how it affects businesses like yours.

Strengthening Email Security: DOJ Disrupts Russian Spear-Phishing Campaign

The need for an iron-clad email security solution is once again making headlines. On October 3,the US Department of Justice (DoJ) reported that, working with Trustwave partner Microsoft, it had disrupted a Russian government-based scheme to steal Americans’ sensitive information, using seemingly legitimate email accounts to trick victims into revealing account credentials.

Disable Data Execution Prevention

Data Execution Prevention (DEP) is a Windows security feature that protects systems by preventing code from executing in memory areas designated for data storage. By ensuring only authorized programs can run in specific memory regions, DEP helps block malicious software, such as viruses, from executing harmful code. It operates at both hardware and software levels, monitoring memory usage to prevent exploits like buffer overflow attacks.

Cato CTRL Threat Research: ProKYC Selling Deepfake Tool for Account Fraud Attacks

Cato CTRL security researchers have recently discovered a threat actor, ProKYC, selling a deepfake tool in the cybercriminal underground that helps threat actors beat two-factor authentication (2FA) for conducting account fraud attacks. The tool being sold is customized to target cryptocurrency exchanges—specifically ones that authenticate new users leveraging a government-issued document and by enabling the computer’s camera to perform facial recognition.

What Is a Modern Breach and How Can It Be Prevented?

In the modern world, data is a precious asset. That means malicious actors will go to great lengths to get their hands on your organization’s information — and if that information is in the cloud, it’s especially vulnerable to those outside forces. You likely have some cybersecurity measures in place, but are you prepared for modern breaches that use constantly evolving tactics to exploit vulnerabilities and gain access?

The Rise and fall of Raccoon Infostealer: Inside a Global Cybercrime Operation

In the ever-evolving landscape of cybercrime, malware-as-a-service (MaaS) has emerged as a lucrative business for cybercriminals. One of the most notorious examples is Raccoon Infostealer, malware designed to harvest personal and financial information from unsuspecting victims worldwide. The mastermind behind this operation, a Ukrainian national named Mark Sokolovsky, recently pleaded guilty in a U.S. federal court to his role in the cybercrime network.

Privileged Access Management Use Cases

There are several use cases for a Privileged Access Management (PAM) solution, including secure remote access, credential management and least-privilege access enforcement. PAM helps organizations manage the access of authorized accounts to highly sensitive data, including IT departments, HR or staff who handle payroll systems. Continue reading to learn more about the different use cases for PAM and why you should choose KeeperPAM as your PAM solution.

Choosing the Right Deployment Option for Your API Security Solution

You need an API security solution. That much is a given (although some may argue it isn’t!). While essential for business growth and innovation, APIs, or Application Programming Interfaces, expose the organizations that use them to cyber threats. Attackers are both aware of and actively exploiting this fact: Wallarm recently revealed that attacks on APIs impacted 98.35 million users in Q2 2024.

Ruby affected by CVE-2024-45409

CVE-2024-45409 is a critical vulnerability in the Ruby-SAML (affecting versions up to 12.2 and from 1.13.0 to 1.16.0) and OmniAuth SAML libraries. It hence effectively poses a security risk for unpatched versions of GitLab (read more on the GitLab blog). This vulnerability arises from improper verification of the SAML Response signature. An attacker with access to any signed SAML document can forge a SAML Response or Assertion with arbitrary contents.