Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

CVE-2024-6387: New OpenSSH RegreSSHion Vulnerability Gives Hackers Root Access on Linux Servers - 700,000+ Linux Boxes Potentially at Risk

Labeled as CVE-2024-6387, the recently discovered vulnerability in OpenSSH has become a serious cause for concern among Linux servers. OpenSSH is a collection of networking tools built on the Secure Shell (SSH) protocol. It is widely utilized to secure remote logins, manage and administer remote servers, and transfer files through SCP and SFTP. Nicknamed as the “RegreSSHion Bug”, Researchers at Qualys initially identified the vulnerability in May 2024.

Learn about the top five types of cyber security

In today's digitally-driven world, safeguarding sensitive information is more crucial than ever. As cyber threats become increasingly sophisticated, understanding the different facets of cybersecurity is essential for individuals and organizations alike. In this blog, we'll delve into the top five types of cybersecurity measures that form the backbone of a robust defense strategy. From network security to cloud security, each type plays a pivotal role in protecting data, ensuring privacy, and maintaining the integrity of systems against malicious attacks.

Why Are Personal Alarms Your Ultimate Defense Companion?

As concerns about safety and our well-being increase, it's crucial to have effective self-defense tools at your disposal to protect yourself and those around you. Carrying a safe personal alarm is a great option to improve your security. Whether you're facing a threatening encounter or need assistance in a public space, having this safety tool within reach can make all the difference. Let's find out why these little gadgets are becoming so popular and how they can be your ultimate defense companion.

Five worthy reads: How IAM is the cornerstone of securing identities across business verticals

Five worthy reads is a regular column on five noteworthy items we have discovered while researching trending and timeless topics. This week, we’ll understand the significance of IAM and how it has transformed the identity game in various sectors.

Build the foundation for airport networks with centralized DDI solutions

As airports embark on their digitalization journeys, the significance of connectivity is more pronounced. For an airport to function as a global aviation gateway, connectivity is no longer a mere utility but a strategic asset, crucial to its operations, much like its runways.

Twilio's Authy App Breach: Millions of Phone Numbers Exposed

Twilio, the cloud communications provider, has disclosed a security breach affecting its Authy app, exposing users' phone numbers due to an exploit in an unauthenticated endpoint. Understanding the Authy App Breach Twilio confirmed unauthorized access to an endpoint within Authy, leading to the exposure of data linked to Authy accounts, specifically users' cell phone numbers.

Protegrity Helps AWS Customers Attain Compliance for Data Security

A large solutions and services company facing strict compliance regulations and enforcements needed a powerful, scalable enterprise data protection solution for their data being migrated over to S3, Athena, Amazon Redshift, and Glue environments. The sensitive data included HR, Financial and customer information. Using Protegrity’s field-level data protection, the company overcame this challenge, significantly improving their processes.

Were You Part of the 2024 AT&T Breach? Don't Panic. Here's What to Do.

If you were one of the 70+ million people affected by the 2024 AT&T data breach, you are likely concerned about the safety of your accounts and the risk of your identity being stolen. Although some of the data is from 2019 or earlier, according to AT&T, the 2024 data breach occurred this past March when stolen customer data was found on the dark web. If you were part of this data breach, your identity could be at risk of being stolen because customers’ Social Security numbers were exposed.

CLEARFAKE Update Tricks Victim into Executing Malicious PowerShell Code

CLEARFAKE is the term used to describe the malicious in-browser JavaScript framework deployed on compromised webpages as part of drive-by compromise campaigns to deliver information stealers. It has the potential to impact all sectors. Although the CLEARFAKE fake browser update campaign (which was initially identified in Q2 2023) originally targeted Windows users, it expanded to macOS users in Q4 2023.