Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Keeper Protects From Stolen Credentials With Secure Time-Limited Access

The security concept known as “Privilege Creep” occurs when an individual accumulates access rights over time, retaining entry to systems and data beyond the completion of a specific task or the need for such access. This gradual accumulation of unnecessary privileges within an organization not only complicates the management of access rights but also magnifies the potential for security breaches, data theft and misuse of information.

Exploiting HTTP/2 CONTINUATION frames for DoS attacks

The vulnerability lies in the way HTTP/2 implementations handle CONTINUATION frames, which are used to transmit header blocks larger than the maximum frame size. Attackers exploit this weakness by sending an excessive number of CONTINUATION frames within a single HTTP/2 stream. This flood of frames overwhelms the server's capacity to process them efficiently.

Security Considerations When Using the Public Cloud

As we reach the end of our five-part series on “Secure Cloud Adoption in the Enterprise”, we thought it would be useful to summarize the discussion and also leave with you a few important things to consider when you make the decision to use the public cloud. Clichéd as it may sound, Security and Privacy are probably two of your most important security concerns in cloud computing as an IT executive.

The Cloud Storage and EU GDPR: Steps to Compliance

For those only just tuning into this conversation, the EU Commission negotiated and finalized the text of what is called the “General Data Protection Regulation” (GDPR) in December of 2015. This was officially approved as law in April 2016 and comes into effect on May 25, 2018. And, if you’re an organization that does business in the EU or even has customers from those geographies, this could significantly change the way you do business.

Separation of Duties - Data Privacy and Security

Security and privacy often get conflated even though they are quite different things. When it comes to digital assets, security is often associated with organizations, while privacy is associated with individuals. The truth though is that both are important elements in any digital strategy and can impact both individuals and organizations.

Large-Scale StrelaStealer Campaign Impacts Over 100 Organizations Within the E.U. and U.S.

A new campaign of StrelaStealer attacks identified by security analysts at Unit42 has been spotted targeting E.U. and U.S. organizations. This somewhat new infostealer has evolved to be even better at evading detection in a new string of campaigns aimed at stealing email credentials from well-known email clients.

What to Expect from a Geofencing Marketing Company

In today's era, businesses are always looking for ways to connect with their target audience and make the most of their marketing initiatives. One popular strategy that has emerged recently is geofencing marketing. Geofencing marketing firms specialize in using this tactic to boost a company's brand recognition, customer interaction, and overall marketing effectiveness. In this article, we will explore what you can anticipate from partnering with a geofencing marketing agency and how it can transform your business.

Mastering Digital Forensics: Smart Methods for Investigative Success

As technology evolves, so do the methods and tools used by malicious actors, making it crucial for digital forensic analysts to stay ahead of the curve. This article explores smart strategies, methodologies, and digital forensics software that empower cybersecurity specialists to navigate complex digital environments and effectively uncover crucial evidence.

Custom Cybersecurity and Managed Security Services

Let's face it, keeping your company safe in the digital Wild West of 2024 can feel like playing whack-a-mole with cyber threats. A recent report from Verizon found that cybercrime cost is estimated to reach $10.5 trillion by 2025, leaving many IT teams scrambling to keep up. The problem? The cybersecurity landscape is in constant evolution, with new threats emerging faster than ever. But fear not, there's a solution on the horizon, and it comes in two flavors: custom cybersecurity services and managed security services (MSSPs).

A Guide to NIS 2 Requirements and How Cyberint Helps Meet Them

Cyber threats against critical infrastructure – such as energy and transportation networks – remain pervasive as ever, with 2023 witnessing an astounding 420 million such attacks in total. That’s the bad news. The good news is that critical infrastructure is set to become more secure, at least in the European Union, thanks to the NIS 2 Directive (also known as E.U. Directive 2022/2055).