Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Transforming Critical Infrastructure Security: The Power of Identity

In an era when every aspect of our society depends on reliable critical infrastructure, the role of identity security in safeguarding these essential services has never been more pivotal. With sophisticated cyberthreats escalating, understanding the transformational potential of identity security is akin to orchestrating a symphony. Each section – strings, woodwinds, brass and percussion – must perfectly harmonize to produce a masterpiece.

What is Unrestricted Code Execution? How to Defend Organizations Against this Attack?

Nowadays, with more organizations and individuals relying heavily on third-party software to execute their high-priority and covert tasks, the risks of data breaches or cyber-attacks are becoming a serious issue. A cyber attack is basically an attempt by cybercriminals, hackers, or other digital adversaries to access a computer network or system with a willingness to expose, alter, steal, or destroy your million-dollar information.

5 pre-built workflows created and shared by Tines users

At Tines, we're super proud of our library. Featuring hundreds of pre-built workflows, it's an incredibly useful source of inspiration for Tines users, from newbies right up to advanced builders. This week, the library reached two major milestones - it now contains 750 pre-built workflows, 75 of which were submitted by Tines users.

Beyond Bullet Holes: Unveiling Cybersecurity's Hidden Risk Exposures

The art of risk assessment has long been a crucial element of military strategy and decision-making – and it remains critical to today’s best practices in cybersecurity defense. Abraham Wald, a mathematical genius, played a pivotal role in revolutionizing the understanding of hidden risk and exposure with his innovative work on aircraft survivability. During World War II, the US air force wanted effective methods to protect aircraft against enemy fire.

Acid Rain, Pikabot, VenomRAT, Mallox Ransomware, and More: Hacker's Playbook Threat Coverage Round-up: March-April 2024

In this version of the Hacker’s Playbook Threat Coverage round-up, we are highlighting attack coverage for newly discovered or analyzed threats, including those based on original research conducted by SafeBreach Labs. SafeBreach customers can select and run these attacks and more from the SafeBreach Hacker’s Playbook™ to ensure coverage against these advanced threats.

Cybersecurity: The Battle of Wits

With cybersecurity, the digital battlegrounds stretch across the vast expanse of the internet. On the one side, we have increasingly sophisticated and cunning adversaries. On the other, skilled cybersecurity practitioners who are desperate to protect their companies’ assets at all costs. One fundamental truth rings clear: it’s an ongoing and relentless battle of wits.

The New SEXi Ransomware Targets VMware ESXi Servers: What You Need to Know?

Several companies running their workloads on VMware ESXi servers were attacked by the hacking group SEXi. They developed ransomware called SEXi to encrypt VMware ESXi servers, virtual machines, and backups. SEXi = ESXi – quite an interesting name, isn’t it? It points directly to ESXi.

Paris Olympic Games wins cybersecurity silver - how does your attack surface compare?

Using our own proprietary External Attack Surface Management (EASM) solution, Outpost24’s Sweepatic, we have conducted an attack surface analysis on the Paris 2024 Olympic Games online infrastructure. The Paris 2024 cybersecurity team have done plenty right, but we’ve also highlighted some real-life attack surface risks that have slipped through the gaps (and do so for many organizations) including open ports, SSL misconfigurations, cookie consent violations, and domain squatting.

How To Spot Typosquatting Domains Using Asset Discovery Tools

There’s a seemingly endless list of cybersecurity threats facing organisations today. Among these threats, typosquatting stands out as a deceptive practice used by threat actors to exploit user errors in typing website addresses. To combat this growing menace, asset discovery tools play a crucial role in identifying and mitigating the risks associated with malicious typosquatting domains.

Securing Copilot for Microsoft 365: New AISPM Capabilities from Zenity

In the realm of modern enterprise productivity suites, Copilot for Microsoft 365 stands as a huge driver for efficiency, offering business users the ability to aggregate, summarize, and process data within the M365 suite of tools. However, for organizations with diverse infrastructure and applications, and the need for real-time data interactions, the out-of-the-box functionality requires augmentation to reach its full potential, not to mention secure controls for Copilot for M365.