Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Unlocking SOC as a Service with Elastic Security for public sector

In today’s increasingly complex and evolving threat landscape, Security Operations Centers (SOCs) have become the nerve center for protecting critical national and local government assets. Building and maintaining an in-house SOC is often beyond the reach of many government agencies due to budget constraints, the need for skilled personnel, and the rapid growth of cyber threats.

Container security best practices: Comprehensive guide

Sticking to container security best practices is critical for successfully delivering verified software, as well as preventing severe security breaches and its consequences. These best practices are an important part of implementing a robust Cloud Native Application Protection Platform (CNAPP). According to the 2023 CNCF Survey, over 90 percent of companies are using containers, while 84 percent of companies were using or evaluating Kubernetes.

Cyber Essentials certification cost and related expenses: A detailed breakdown

The Cyber Essentials assurance scheme is one of the best accreditations you can obtain for improving your organization's cybersecurity posture and reducing the risk of cyberattacks. It offers a robust set of controls you can implement to fortify the security of your data, systems, and other IT assets and build greater trust with your stakeholders.

Ruby affected by CVE-2024-45409

CVE-2024-45409 is a critical vulnerability in the Ruby-SAML (affecting versions up to 12.2 and from 1.13.0 to 1.16.0) and OmniAuth SAML libraries. It hence effectively poses a security risk for unpatched versions of GitLab (read more on the GitLab blog). This vulnerability arises from improper verification of the SAML Response signature. An attacker with access to any signed SAML document can forge a SAML Response or Assertion with arbitrary contents.

Every transaction tells a story: Protecting HPE NonStop ecosystems against AI-driven cyber threats

In a world where digital transformation is accelerating, the stakes for safeguarding critical infrastructure, government systems, and financial services have never been higher. These sectors are increasingly targeted by sophisticated payment fraud schemes and AI-powered cyberattacks, leaving them under immense pressure to shield their customers from threats.

Cato CTRL Threat Research: ProKYC Selling Deepfake Tool for Account Fraud Attacks

Cato CTRL security researchers have recently discovered a threat actor, ProKYC, selling a deepfake tool in the cybercriminal underground that helps threat actors beat two-factor authentication (2FA) for conducting account fraud attacks. The tool being sold is customized to target cryptocurrency exchanges—specifically ones that authenticate new users leveraging a government-issued document and by enabling the computer’s camera to perform facial recognition.

What Is a Modern Breach and How Can It Be Prevented?

In the modern world, data is a precious asset. That means malicious actors will go to great lengths to get their hands on your organization’s information — and if that information is in the cloud, it’s especially vulnerable to those outside forces. You likely have some cybersecurity measures in place, but are you prepared for modern breaches that use constantly evolving tactics to exploit vulnerabilities and gain access?