Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Effortlessly Migrate Your AKS Clusters to Azure Container Storage Using CloudCasa

Azure Container Storage is a cloud-based volume management, deployment, and orchestration service built natively for containers. It integrates with Kubernetes, allowing you to dynamically and automatically provision persistent volumes to store data for stateful applications running on Kubernetes clusters.

Fireblocks x Lido Institutional: Bringing Liquid Staking to the Fireblocks Network

In response to growing institutional demand, Fireblocks has launched an integration with Lido to provide easy and secure in-platform access to Lido’s liquid staking protocol and stETH token. Users can now stake their ETH, receive rewards, and use stETH for on-chain activities, including Fireblocks Off Exchange, which allows Fireblocks users to lock their stETH in a self-custodial collateral wallet to trade on exchanges like Deribit and Bybit.

The Cloud Security Confidence Gap: What Leaders Need to Know

In this increasingly cloud-first world, data protection is more important than ever. With so many organizations relying on cloud applications to get work done, keeping sensitive information secure is a top priority. But balancing convenient access with strong security measures is no easy feat. In fact, only a small fraction of security leaders feel truly confident in their current data security measures. Lookout recently surveyed 100 executives to get their take on data security in the cloud.

Introducing Ephemeral IDs: a new tool for fraud detection

In the early days of the Internet, a single IP address was a reliable indicator of a single user. However, today’s Internet is more complex. Shared IP addresses are now common, with users connecting via mobile IP address pools, VPNs, or behind CGNAT (Carrier Grade Network Address Translation). This makes relying on IP addresses alone a weak method to combat modern threats like automated attacks and fraudulent activity.

What Is PGP Encryption and How Does It Work?

You’re working late Thursday evening as a contractor for a powerful government agency. You stumble across classified documents uncovering a surveillance program that invades the privacy of millions of citizens. Your heart races as you decide to expose this to the masses and enlist the help of a few journalists. But you also know the organization you work for monitors emails (and other forms of communication). If your emails hit the wrong eyes, you could face severe penalties.

Half of all Financial Services Cyber Attacks Start with a Very Costly Phish

New analysis of attacks on the financial sector shows that the combination of phishing emails and compromised credentials is a recurring — and financially impactful — threat. According to IBM, financial services is the second most expensive sector with an average cost of a data breach at $6.1 million.

History of Vulnerability Management: Lessons from Past to Present

Vulnerability management has been a key part of how companies protect their digital assets and has helped cybersecurity evolve. In the last few decades, vulnerability management has changed from simple patch management to complex, multi-layered plans meant to act upon cyber threats that are getting smarter all the time. In the early days of cybersecurity, people only took action after security was breached instead of trying to stop them.

6 Key Principles of AI and Data Protection: How the AI Act Safeguards Your Data

Artificial Intelligence (AI) plays a critical role in modern data handling. AI processes vast amounts of data, from personal information to business analytics, at unprecedented speeds. This raises serious concerns about AI and data protection. With AI’s growing capabilities, ensuring the security of personal data is essential. The AI Act aims to regulate AI systems, focusing on responsible data usage. It introduces rules that safeguard user data, complementing existing regulations like GDPR.

Educate Your Users About Malicious SEO Poisoning Attacks

Since the beginning of computers, social engineering has been the number one way that computers and networks have been compromised. Social engineering is involved in 70% to 90% of all successful data breaches. Nothing else is even close (unpatched software and firmware are involved in 33% of successful attacks, everything else is 1% or less).

Zscaler: There are 200 Malicious Lookalike Domains for Every 1 Impersonated Brand

Analysis of typosquatting and brand impersonation activity across 500 of the most visited domains provides insight in to how these techniques come together to effectively deceive. From February 2024 to July 2024, Zscaler’s ThreatLabz tracked more than 30,000 lookalike domains that impersonated some of the world’s most well-known brands.