Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Why Peering Relationships are Key to Providing a Phenomenal User Experience

One of the many benefits of running your own private cloud infrastructure are the performance improvements when you’re in control of your own connectivity, shortening the path and reducing latency for both users connecting to your private cloud and first mile connectivity to applications and services.

How To Identify a Fake Text Message

A few ways you can identify if a text message is fake is if its context is irrelevant to you; it’s claiming to be someone you know from an unknown number; it displays a sense of urgency; it’s asking you to click on a link; and it contains spelling, grammatical errors or both. In recent years, there has been an abundance of fake text messages targeting individuals to steal their personal information – placing victims at risk of having their identity stolen and losing money.

Automatic source locations with Rego

At Snyk, we are big fans of Open Policy Agent’s Rego. Snyk IaC is built around a large set of rules written in Rego, and customers can add their own custom rules as well. We recently released a series of improvements to Snyk IaC, and in this blog post, we’re taking a technical dive into a particularly interesting feature — automatic source code locations for rule violations.

CVSS: The Common Vulnerability Scoring System

Cybersecurity measures have become important in the ever-evolving landscape of digital threats. With organizations increasingly relying on digital technologies to drive their operations, the risk of cyberattacks becomes more likely, with potential consequences ranging from financial losses to reputational damages.

Add to Chrome? - Part 1: An Analysis of Chrome Browser Extension Security

Welcome to the wonderful world of browser extensions! These tools promise efficiency, entertainment, and customization at your fingertips. But could those promises come with any hidden danger? In this blog series, we provide an overview of SURGe research that analyzed the entire corpus of public browser extensions available on the Google Chrome Web Store. Our goal? To unravel whether these extensions facilitate a better browsing experience or represent potential threats lurking in plain sight.

ISO 27002: Information Security Controls Explained

In the race to execute digital transformation strategies, the rear-view mirror never fails to shake off the looming cyber threats that are a significant stumbling block to any organizational objectives. Today, nearly 48% of organizations are experiencing more cyberattacks than the previous year.

Credit Union Struggles Following Ransomware; SSNs of 61k Stolen

The Bayer Heritage Federal Credit Union has headquarters in West Virginia. Like other unions, they offer various services that assist members in saving and investing no matter their life phase. Bayer’s products include financial accounts, IRAs, investment options, and many loans, from estate to student. At the end of October 2023, Bayer reportedly experienced a cyberattack; the breach lasted only a day but exposed the Social Security Numbers (SSNs) of 61,159 borrowers.

Weekly Cybersecurity Recap February 9

This week, around 643k data records were announced as lost in the cyber wars. Early on, the public learned of HopSkipDrive’s event, which impacted 155k student guardians. The most significant breach of this week, with an impact figure of over 307k, also occurred early in the week; the Des Moines Orthopaedic Surgeon clinic claimed the incident was due to a vendor’s failure.

How to Create a Zero Trust Network

Organizations no longer keep their data in one centralized location. Users and assets responsible for processing data may be located outside the network, and may share information with third-party vendors who are themselves removed from those external networks. The Zero Trust approach addresses this situation by treating every user, asset, and application as a potential attack vector whether it is authenticated or not.