Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

ChatGPT vs Cyber Threats - The REAL Role of AI in Cybersecurity

By James Rees, MD, Razorthorn Security In the rapidly evolving world of cybersecurity, artificial intelligence (AI) and large language models (LLMs), have become buzzwords that seem to promise revolutionary solutions. However, as with any emerging technology, it’s crucial to separate hype from reality.

Ten Ways You Can Avoid Debit Card Fraud

Having your debit card information stolen or used by someone else to impersonate you can be stressful and damaging to your finances and identity. To avoid becoming a victim of debit card fraud, you should secure your bank accounts with strong passwords, use your credit card for purchases, be cautious of phishing scams and more. Continue reading to learn what debit card fraud is and how to avoid becoming a victim of it.

The Power of Platform-Native Consolidation in Application Security

The application security landscape is shifting as organizations move away from a fragmented ecosystem of point solutions towards a unified platform such as the Mend AppSec Platform. Leveraging these platform-specific strengths brings numerous advantages: streamlined workflows, a cross-product workflow engine, a consolidated data model that enhances security posture, and developers that can focus fully on innovation.

The Risks of Storing Your Passwords in Google Sheets

There are several risks associated with storing your passwords in Google Sheets, including its lack of end-to-end encryption by default and lack of secure sharing capabilities. While Google Sheets uses a secure type of encryption, it does not use end-to-end encryption automatically, meaning anyone at Google can view your files. It is risky to store information as important as your passwords in Google Sheets because the software is not designed to be a password manager.

The most effective attack surface management tools and techniques

The ability to manage and monitor your attack surface is no longer a luxury—it’s a necessity. The rapid expansion of networks, coupled with the shift to cloud computing and remote work, has created a vast and ever-changing attack surface that requires constant vigilance. This article delves into the most effective attack surface management tools and techniques, offering insights into how they can bolster your cyber security posture and safeguard your organisation against evolving threats.

Professor Alan Watkins demystifies cybersecurity for small business owners

How worried should small businesses be about cyber attacks? Pretty worried, according to Alan Watkins, a professor for the Cybersecurity Master’s Degree Program at National University, and an expert with a long career in cybersecurity, emergency management, and law enforcement.

Being forced to migrate from IBM QRadar to PAN XSIAM? Know the pitfalls

Palo Alto Networks acquired IBM QRadar SaaS assets, leaving several organizations in limbo and uncertain about the future of their security information and event management (SIEM). Security teams grapple with a complex and potentially disruptive transition as Palo Alto Networks pushes and even mandates migration to its relatively new XSIAM platform.

Amplify SOC efficiency via automated cloud detection and response with Sysdig and Torq

Cloud attackers are swift and sophisticated, requiring robust threat detection and response programs that can keep pace with these malicious actors born in the cloud. They exploit the automation and scale of the cloud, along with new techniques, to accelerate all stages of an attack and inflict damage within minutes.

From advisory to action: automate the FBI's RansomHub recommendations with Tines

The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the Multi-State Information Sharing and Analysis Center (MS-ISAC), and the Department of Health and Human Services (HHS) recently issued a joint advisory on the RansomHub ransomware. RansomHub is a ransomware-as-a-service variant, previously known as Cyclops and Knight. Since February 2024, it has encrypted and exfiltrated data from over 210 victims spanning multiple industries.