Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

The Risks of Storing Your Passwords in Google Sheets

There are several risks associated with storing your passwords in Google Sheets, including its lack of end-to-end encryption by default and lack of secure sharing capabilities. While Google Sheets uses a secure type of encryption, it does not use end-to-end encryption automatically, meaning anyone at Google can view your files. It is risky to store information as important as your passwords in Google Sheets because the software is not designed to be a password manager.

Ten Ways You Can Avoid Debit Card Fraud

Having your debit card information stolen or used by someone else to impersonate you can be stressful and damaging to your finances and identity. To avoid becoming a victim of debit card fraud, you should secure your bank accounts with strong passwords, use your credit card for purchases, be cautious of phishing scams and more. Continue reading to learn what debit card fraud is and how to avoid becoming a victim of it.

Trustwave SpiderLabs' Red Team Flight Tests Microsoft Copilot

The advent and widespread acceptance of Large Language Models (LLMs), such as Microsoft Copilot, by organizations and even average consumers has created another surface threat area that cybersecurity teams must come to understand. To help with this process, Trustwave SpiderLabs conducted a Red Team exercise against a licensed version of Microsoft Copilot.

Complexity of Attack Surface Management in Cloud Environments

Legacy attack surfaces were small and simple. There were fewer servers and endpoints to protect. The tooling required to secure it was basic – perimeter firewalls, antivirus software, and server/network/application monitoring tools. When organizations migrate to the cloud, things change and become complex. For starters, on-premise infrastructure and applications can’t be left out in favor of the cloud. Most organizations run hybrid setups.

Rubrik and Pure Storage Join Forces to Deliver Complete Cyber Resilience of Mission-Critical Data

Data has become organizations' lifeblood. However, with the exponential growth of data comes unprecedented challenges in securing it across both short-term and long-term storage. To make matters worse, cyber threats are evolving rapidly, and businesses need robust solutions to safeguard their critical data. We're excited to announce a groundbreaking partnership between Rubrik and Pure Storage.

Deep Dive into the Latest API Security Vulnerabilities in Envoy

Envoy has carved out a critical role in cloud-native computing, becoming increasingly prevalent as the default ingress controller for Kubernetes. This high-performance proxy, developed by Lyft and now part of the Cloud Native Computing Foundation’s arsenal, is integral for companies scaling up their Kubernetes deployments. Envoy ensures efficient load balancing, security, and operational agility by managing external access to services within Kubernetes clusters,.

CISA Warns of Hackers Targeting Industrial Systems with "Unsophisticated Methods" Amid Lebanon Water Hack Claims

The US Cybersecurity and Infrastructure Security Agency (CISA) has warned that malicious hackers continue to be capable of compromising industrial control systems (ICS) and other operational technology (OT) using "unsophisticated methods" - suggesting that much more still needs to be done to secure them properly.