Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Strengthening Cybersecurity in Local Government

In the ever-evolving cybersecurity landscape, organizations are constantly striving to enhance their defenses against organized malicious actors. As cyber attacks become more advanced, regulatory bodies have created and enforced compliance requirements to ensure that organizations protect sensitive data and systems. One groundbreaking solution that can help your organization meet these challenges is Extended Detection and Response, known as XDR.

How to protect your business from NFT phishing attacks and spam

The Web3 ecosystem has experienced a sharp increase in spam NFTs. While spam NFTs may seem benign – commonly used as promotions for new NFT collections – they can also be used as a method for phishing unsuspecting users. Today, threat actors are using spam NFTs to drain wallets in a variety of ways. In this blog post, we take a closer look at some of these methods and the new security protections Fireblocks has developed to safeguard our customers.

The Crucial Role of Network Penetration Testing in Today's World

In an era dominated by technological advancements and interconnected digital landscapes, the need for robust cybersecurity measures has never been more critical. Cyber threats, attacks, and ransomware incidents continue to rise, targeting organizations of all sizes and industries. In this landscape, network penetration testing has emerged as a vital component of a comprehensive cybersecurity strategy.

Announcing Graylog API Security v3.6

Graylog API Security v3.6 is here! Just taking the version number by itself, v3.6 sounds like an incremental step forward. But the truth is that v3.6 isn’t just a release milestone; it’s a huge inflection point in our mission to improve API security. There are multiple “firsts” in v3.6, which makes the total combination even more exciting.

Free API Discovery & Threat Detection Tool From Graylog!

In the fast-evolving landscape of digital connectivity, Application Programming Interfaces (APIs) play a pivotal role in facilitating seamless communication between diverse software systems. As organizations increasingly rely on APIs to power their applications, robust API security becomes paramount.

Improving domain discovery with new connectors

Our new domain connector simplifies and expands support for organizations integrating cloud providers to Detectify. Security teams can now have even greater confidence in the security posture of their attack surface, with increased visibility into the identification, inventorying, and continuous monitoring of the latest vulnerabilities and exposures.

CVE-2024-21893: New Ivanti Zero-Day Vulnerability Actively Exploited

On January 31, 2024, Ivanti published an article disclosing two high severity vulnerabilities: CVE-2024-21893: A server-side request forgery flaw present in the SAML component of Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons. This vulnerability allows an unauthenticated threat actor to access restricted resources. Ivanti reports that a limited number of customers have been affected by this vulnerability.

Customize your Access Policies with DataTrails

Signing up with DataTrails comes with the ability to share your audit trails with your business partners, other applications, and your internal team. Access policies control users, apps & organizations’ read & write privileges to provenance data in DataTrails. If you’re using an integration, access policies offer a way to fine-tune these integrations, giving specific permissions to add to and read your records.

Swipe Left on These 6 Most Popular Online Dating Scams

While online dating scams may be a relatively new concept, tales of heartbreak are as old as time. Now, there’s a multi-billion dollar industry dedicated to romantic films, music, and, dating apps. By the end of 2023, dating apps will have reached over 400 million users, generating over $8 billion in revenue through dating, casual dating, and matchmaking services.