Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Protect Your Data with Backup as a Service

With modern businesses increasingly relying on multitenant and multicloud platforms, safeguarding critical data has never been more crucial. Backup as a Service (BaaS) offers a scalable, efficient way to protect valuable assets and ensure business continuity in the face of unexpected incidents.

Secure Your CI/CD Pipelines: 7 Best Practices You Can't Ignore

What’s the difference between an unsupervised toddler with markers and an unsecured CI/CD pipeline? Both look fine at first, but chaos is inevitable. While a toddler might scribble on walls, an unsecured pipeline invites attackers to wreak havoc on your digital assets. Cleaning up after either is tough—prevention is smarter. The CrowdStrike 2024 report reveals that cloud-conscious intrusions skyrocketed by 110% in 2023.

What You Need to Know about the Community Health Center Data Breach

Community Health Center (CHC) is a non-profit founded in 1972 and headquartered in Middletown, Connecticut. It offers a broad range of services, including dentistry, primary care, urgent care, specialty medical services, and behavioral health. CHC provides healthcare services to residents in various parts of the state, including Bristol, Hartford, Waterbury, Middletown, Stamford, and New Britain.

What You Need to Know about the DeepSeek Data Breach

DeepSeek, founded by Liang Wenfeng, is an AI development firm located in Hangzhou, China. The company focuses on developing open source Large Language Models (LLMs) and specializes in data analytics and machine learning. DeepSeek gained global recognition in January 2025 with the release of its R1 reasoning model rivalling OpenAI's o1 model in performance but at a substantially lower cost.

New Phishing Campaign Abuses Webflow, SEO, and Fake CAPTCHAs

Netskope Threat Labs is tracking a widespread phishing campaign affecting hundreds of Netskope customers and thousands of users. The campaign aims to steal credit card information to commit financial fraud, and has been ongoing since the second half of 2024. The attacker targets victims searching for documents on search engines, resulting in access to malicious PDF that contains a CAPTCHA image embedded with a phishing link, leading them to provide sensitive information.

Cloud invaders: Spotting compromised users before it's too late

Identities have become one of the most common ways modern threat actors gain a foothold in the cloud. From stolen credentials to overly permissive roles and privilege escalation, attackers use a range of tactics to exploit identities and use them to launch devastating breaches. Once inside your environment, they can move laterally, exploit resources, or steal sensitive data, leaving security teams scrambling to contain the damage.

More than Security: PAM's Impact on Your Business Operations, Productivity, and ROI

Privileged access management is no longer just a security tool — it’s a strategic asset that impacts business operations, productivity, and return on investment (ROI). In this article, you’ll discover how PAM in business not only mitigates cybersecurity risks but also streamlines IT operations, reduces costs, and enhances employee efficiency.

DORA for DevOps and Jira Admins: How to Prepare Your Business for the Digital Operational Resilience Act

Given the reality of today’s cybersecurity, it is of utmost importance to have frameworks and regulations. These help both the customers and the organizations to stay protected against the cyber threats that are around us. On 17th January 2025, the Digital Operational Resilience Act (DORA), formally known as Regulation (EU) 2022/2554, came into full effect.

Adversary Tradecraft: A Deep Dive into RID Hijacking and Hidden Users

Researchers at AhnLab Security Intelligence Center (ASEC) recently published a report on the Andariel threat group, a DPRK state-sponsored APT active for over a decade, that has been leveraging RID hijacking and user account concealment techniques in its operations to stealthily maintain privileged access to compromised Windows systems.