Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Understanding an 0ktapus Phishing Campaign

The recent surge in phishing attacks capable of bypassing multi-factor authentication (MFA) has raised significant concerns in the cybersecurity landscape. These attacks highlight the fact that even systems protected by MFA have vulnerabilities, making it imperative for organizations to stay vigilant and not rely on a single control as a silver bullet. One such campaign, known as 0ktapus, provides a crucial case study in understanding the methods and impacts of these phishing attacks.

Windows Spotlight - Configurations for Your Lock Screen

Windows Spotlight automatically displays a variety of high-resolution lock screen images. These come from various sources, including Bing searches, professional photographers, and Microsoft’s own collection. It's available on Windows Enterprise and Education editions only. The images encompass a variety of subjects from nature scenes, cityscapes, and architectural marvels to keep a fresh login screen.

UX Design and Research for AI-Driven Products with Rubrik User Researcher Tianmi Fang

In this video, we delve into the design process of Rubrik Ruby, your generative AI-powered cyber recovery companion, and how it addresses real user problems for security and IT teams. We took a different approach by focusing on understanding user pain points and leveraging the power of AI to provide solutions. One of Ruby's key benefits is its ability to automate repetitive tasks, freeing up your time and energy. Ruby utilizes AI and automation to prioritize overwhelming information, ensuring that you get what you need when you need it.

Device Groups | JumpCloud University Tutorial (2024)

In this tutorial, we'll go over how to use device groups to manage user group access and policy configurations for multiple devices at once within your JumpCloud Admin Portal. To discover more resources checkout JumpCloud University where you’ll find courses, tutorial videos, engaging guided simulations, and end user content.

Support for AWS Nitro Enclaves on Fireblocks

At Fireblocks, we know that our customers employ a variety of different cloud configurations for their own internal systems. That’s why we’re excited to announce that Fireblocks now supports Amazon Web Services (AWS) Nitro Enclaves. With this new development, Fireblocks customers building products on AWS can now utilize Nitro Enclaves to run their Fireblocks API Co-Signer.

Boost Efficiency and Creativity with Egnyte's Innovative Search Capabilities

Data is growing at an exponential rate, with organizations expected to generate a staggering 181 zettabytes by 2025. This surge is driven by the proliferation of multimedia content, user-generated content, and IoT devices. However, 90% of this data is unstructured, making it challenging for conventional search engines to efficiently index and deliver relevant results. According to IDC, knowledge workers spend about 2.5 hours or 30% of their workday, searching and retrieving information.

Trustwave SpiderLabs: The Unique Factors that Make Professional Services a Target

Trustwave SpiderLabs has put together nine vertical threat reports over the past 12 months, but in its most recent effort, the 2024 Professional Services Threat Landscape: Trustwave Threat Intelligence Briefing and Mitigation Strategies report, our team of elite researchers delve into one of the broadest and most complicated vertical sectors yet covered.