Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

How Did My Personal Information Get on the Dark Web?

If you realize that your personal information has been found on the dark web, you may be wondering how this could have happened. Your personal information could have ended up on the dark web through a data breach, a compromised account, a phishing scam or a malware infection. The dark web is part of the internet used by cybercriminals to buy and sell stolen information. Continue reading to learn how to tell if your personal information is on the dark web, how it got there and how to protect your identity.

How To Detect and Remove a Keylogger

You can detect a keylogger if you notice unfamiliar apps on your device, slower performance speeds, a lag in mouse movements or strange background noises on phone calls. A keylogger is a type of malware that requires an entry point, such as an email or cloud program, to be installed on your device. Once it is on your device, a cybercriminal can monitor every keystroke you make to learn your login credentials and private information.

ALPHV BlackCat Ransomware: A Technical Deep Dive and Mitigation Strategies

ALPHV, also known as BlackCat or Noberus, is a sophisticated ransomware group targeting critical infrastructure and various organizations, including being the most active group used to attack the financial services sector. ALPHV first appeared in November 2021 and operates on a Ransomware-as-a-Service (RaaS) model, allowing affiliates to use its malware for their own attacks in exchange for a cut of the ransom payments.

Corelight Open NDR Achieves VMware Ready for Telco Cloud Infrastructure Certification

Accelerate Your Hybrid Cloud Security with Corelight Open NDR, now in the VMware Marketplace Corelight’s Open NDR platform has achieved VMware Ready for Telco Cloud Infrastructure (TCI) certification and is now active in the VMware Marketplace.

Five Hidden Costs of Cyber Attacks

In the modern, interconnected world, no organization is immune from a cyber attack. Indeed, most experts agree that it is a matter of “when,” not “if” an organization will be targeted by threat actors. If an attack is successful, the immediate costs — including potential ransom payments, lost revenue, and costs associated with remediation and restoration — can be substantial.

Solving the cybersecurity skills shortage

Grand View Research predict that USA demand for MSP services will double by 2030, a compound annual growth rate of 13%. It’s a similar story in most developed markets as businesses seek to outsource their non-core IT activities to experts. Such a strong sellers' market would normally mean easy growth. But MSPs cannot hope to recruit and train sufficient cyber security engineers. America has a 500,000 strong cybersecurity job gap.

Top open-source CSPM projects to secure your cloud infrastructure

As more organizations move their critical infrastructure to the cloud, ensuring security has become a top priority. This is where Cloud Security Posture Management (CSPM) comes in. CSPM solutions validate the configuration of cloud services from a security perspective, ensuring alignment with best practices and compliance frameworks such as CIS Benchmarks, PCI-DSS, NIST, and others.

Physical Security In The Age Of Digital: Access Control System Vulnerabilities

Access control systems are the physical form of the layers of data, credential and identity controls underpinning the systems relied on every day. Yet, they can be an afterthought; even the most high-profile breaches of physical security systems can take years to rectify. Security Week highlights the vulnerabilities affecting Nice Linear, a widely used proprietary system in the world of smart homes. Over 2,500 individual vulnerabilities flagged in 2019 alone.