Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Critical triggers to reassess your SIEM: when and why to evaluate

You wouldn’t drive a car that hasn’t been serviced in a decade. So why are you still trusting a legacy SIEM solution? The world of cybersecurity is in a constant state of flux, and your security information and event management (SIEM) needs to keep up. If you’re not regularly reassessing it, you might as well roll out the red carpet for hackers. Let’s discuss when and why you should seriously consider giving your SIEM a much-needed check-up.

Securing the Cyber Kill Chain

We recognize that federal agencies face a wide range of cyber threats in today’s hybrid and cloud work environment, which requires securing multiple endpoints. From nation-states to organized crime groups, adversaries are looking to steal data at the highest levels of government, and the stakes have never been higher. Protecting sensitive information, ensuring national security and safeguarding public trust all hinge on effective cybersecurity strategies.

Hackers Exploit Exposed Selenium Grid Servers for Proxyjacking and Cryptomining

Hackers are increasingly targeting exposed Selenium Grid servers, hijacking them for cryptomining and proxyjacking activities. Selenium, an open-source browser automation tool widely used for web application testing, has become a valuable target for cybercriminals. As these servers often lack proper security measures, threat actors are seizing the opportunity to leverage them for their own gain.

How Phishing-as-a-Service Exposes Financial Services to Extensive Threats

Phishing remains the favored and most successful method of obtaining an initial foothold in a targeted organization. So it should come as no surprise that threat actors have developed turnkey solutions that enable even low-skilled hackers to conduct successful email attacks.

What Is a Password Generator?

A password generator is an online tool that automatically creates strong, random passwords at the click of a button. To create unique passwords, a password generator combines a variety of uppercase and lowercase letters, numbers and symbols. Password generators dramatically ease the process of creating strong passwords by automatically producing random, lengthy ones – two qualities that make passwords more challenging for cybercriminals to crack.

Application Security - The Complete Guide

Application security is the combination of tools, practices, and policies that are used to protect the application layer of software from threat actors. Once something of an afterthought, application security is now widely and rightfully recognized as a vital part of the software development life cycle (SDLC). As the complexity of technology increases, considering application security early and often in the SDLC is imperative to keeping data and resources from falling into the wrong hands.

New Latin American fraud rules demand real-time action: Is your bank ready?

With Latin America facing an unprecedented increase in claims for unrecognized credit and debit card transactions, banks and card issuers are directly feeling the impact of fraud and cyber-attacks that are growing more sophisticated by the day. Recent regulations have been implemented across Latin America to address a variety of payment fraud, including an unprecedented surge in claims of unrecognized transactions involving debit, credit and financing products.

Continuing to Evolve Next-Gen Asset Attribution Through Service Provider Collaboration

One of the primary reasons that the Bitsight Security Rating is widely respected and closely correlated with real-world security outcomes is the scale and sophistication of our asset attribution capabilities. In a recent post, my colleague Francisco Ferreira shared an update on the momentum building with Bitsight Graph of Internet Assets (GIA), the AI-powered engine we use to map assets to organizations and build our Ratings Trees.

ASM vs CASM: Understanding the key differences

There is a pressing need to protect an organisation’s digital assets against cyber attacks and it has never been more critical. The increasing complexity and dynamic nature of IT environments mean that traditional security measures often fall short. This has led to the emergence of new defensive approaches, such as attack surface management (ASM) that proactively safeguard against cyber threats.