Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

EP 47 - Digital Trust and the Identity Cornerstone

In this episode of Trust Issues, Jan Vanhaecht, the Global Digital Identity Leader at Deloitte, Belgium, delves into the intricate realms of digital trust and risk management with host David Puner. The discussion covers topics ranging from the impact of regulations on cybersecurity practices to the pivotal role of identity in building a robust security culture.

Top 10 Linux Vulnerability Scanners for 2024

As you step into 2024, do you have absolute confidence in the security of your Linux systems? The stakes have never been higher, and the risk landscape for Linux is constantly shifting – which presents an ongoing challenge to your system’s security. In 2023 alone, 282 Linux-specific vulnerabilities were added to the Known Exploited Vulnerabilities (KEV) Catalog by CISA. Employing an advanced vulnerability scanner is the next step to protecting your systems from these and other potential risks.

A Complete Step-by-Step Guide to Achieve AI Compliance in Your Organization

AI compliance has become a pivotal concern for organizations in a rapidly evolving technological landscape. It is inconceivable to overlook the growing importance of AI compliance, particularly for entities deeply entrenched in AI operations. It involves an intricate intersection of legal, ethical, and regulatory dimensions, emphasizing the need for a cohesive approach to ensure comprehensive AI compliance.

Exploring host discovery techniques in a network

In a network assessment, one of the first tasks is to narrow down a large set of IP addresses to a list of active or interesting hosts. It's like trying to find specific houses in a big neighbourhood without knocking on every door. Scanning every possible connection of every single IP address can be slow and often unnecessary. What makes a host interesting depends on what you're looking for.

CRN Recognizes WatchGuard in its Prestigious 2024 Security 100 List

CRN has once again named WatchGuard to its prestigious annual Security 100 list as one of the 20 Coolest Network Security Companies Of 2024. The Security 100r ecognizes leading IT security vendors who are committed to working hand in hand with channel partners to protect businesses from cyber threats.

Why Your Organization Needs Dynamic Secrets and Rotation

In today’s rapidly evolving digital landscape, organizations confront a formidable array of cyber threats, with attacks and data breaches becoming increasingly prevalent. As businesses embrace transformative technologies such as AI, automation, cloud-native architectures, microservices and containerization, the proliferation of machine identities has surged, often surpassing human identities.

Disruption of Transportation Services and Infrastructure: NoName Hacking Group Strikes in Support of Polish Farmers

In a bold move aimed at raising awareness and protest against the pro-Ukrainian stance of the Polish authorities, the notorious NoName hacking group launched a series of cyber attacks targeting critical infrastructure in Poland. The group's motive was clear - to disrupt transportation services and infrastructure to show solidarity with Polish farmers' plight. Who is NoName hacking group and what is their motive?

Major Data Breach and Scam Alert: Restorecord.com Compromised, Users Urged to Stay Vigilant

In today's digital age, the threat of data breaches and online scams looms large. Restorecord.com, a prominent bot service known for its data management solutions, has recently been at the center of a significant security breach, impacting approximately 2,871 users. This alarming incident has exposed sensitive data, including Next.js and PHP source codes, emails, usernames, browser data, and IPs, leaving users vulnerable to exploitation by malicious actors.

10 Tips for Mitigating Brand Impersonation Attack Risk

Brand impersonation attacks are a type of phishing attack where a scammer pretends to be a trusted company or brand. The goal is to trick victims into believing they're interacting with the company so they'll be more willing to share their personal information. Brand impersonation attacks can target both individuals and large groups of people. Scammers may use phony websites, mobile apps, or social media pages, as well as bogus emails, voicemails, or text messages.

How a Fortune 500 data company leveraged SafeBreach to transition to 100% cloud

When a large data company decided to migrate their systems fully to the cloud, their cybersecurity team knew it would be a challenge. The company’s senior security architect put it succinctly: “Our CTO said, we’re going completely to cloud. Everyone buckle up.” Though the organization had assets in the cloud for many years, the team wasn’t sure they were ready to be 100% in the cloud from a security standpoint.