Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Beyond Detection: The Rise of Legitimate Software Abuse in Malware Attacks

Cybersecurity researchers have identified an increasing trend where threat actors are abusing legitimate and commercially available packer software, such as BoxedApp, to evade detection and distribute malware, including remote access trojans and information stealers. Targeted Industries and Geographical Spread According to Check Point security researcher Jiri Vinopal, the majority of malicious samples have targeted financial institutions and government sectors.

Drata Integration - How to Automate Technical Vulnerability Management

Aikido Security is now live on the Drata Integration marketplace! That’s great news because navigating today’s cybersecurity regulatory landscape is a bit like walking a tightrope in a hurricane. As cyber threats evolve, so do the regulations designed to keep them in check. Businesses now find themselves grappling with a growing list of compliance requirements, each more stringent than the last.

Storage Born in the Cloud

Storage Born in the Cloud Current estimates show that humans are generating more than 325 million terabytes of data – every single day. That’s an enormous amount of information, and organizations are struggling to manage it. As organizations grow, the data they are managing across business solutions, applications, and end users will continue to increase radically. This data is usually unstructured, often containing multiple different formats and media.

Passkeys vs Two-Factor Authentication (2FA): What's the Difference?

The main difference between passkeys and 2FA is that passkeys completely remove the need for individuals to enter a password, whereas 2FA enhances the security of an account by requiring an additional method of authentication in addition to a traditional username and password. Continue reading to learn more about the differences and similarities between passkeys and 2FA, and which is more secure.

Cloud HSM vs On-Premises HSMs: Choosing the Right Encryption Solution

Data security is one of the most important issues in the modern world, and companies must ensure that all their important information is kept out of cyber criminals’ reach. As technology evolves and more data becomes increasingly vulnerable to cyber-attacks and illegal access, security remains critical for organizations that want to protect their sensitive information.

The Overlooked Truth: User Experience in Cybersecurity

We live in a world where the term "cybersecurity" tends to make folks either shiver with anxiety or yawn with boredom. The narrative has always been about hacking, phishing, and all sorts of digital skullduggery. However, the overlooked truth is that users don't adopt best security practices because they’re designed without the slightest nod to the user experience.

How Can I Protect My Outlook Email?

If you're looking for an email service, you can find several options on the internet: from one of the oldest, Hotmail (now known as Outlook), to Gmail, iCloud, Yahoo, and many more. Today, we will explain their features and introduce some more secure alternatives to help you find the best email service. When we create an Outlook account, we have to accept certain terms and a privacy policy. The fine print that nobody reads, in which we agree to give our pesonal data and privacy to Microsoft.

Brazilian Entities Increasingly Targeted by Nation-State Phishing Attacks

Mandiant has published a report looking at cyber threats targeting Brazil, finding that more than 85% of government-backed phishing activity comes from threat actors based in China, North Korea and Russia. “The Brazil-focused targeting of these groups mirrors the broader priorities and industry targeting trends we see elsewhere,” the researchers write.

Helping Smaller Reporting Companies Adhere to 8-K Regulations With CRQ

In March 2022, when the not-so-new-anymore SEC cybersecurity regulations were initially drafted, some argued that smaller reporting companies, defined by having a public float of less than $250 million or an annual revenue of less than $100 million, should be exempt, given the "outsized costs" they faced. Others proposed that these smaller organizations should have a longer disclosure deadline, helping to alleviate the chances of non-compliance.