Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

Autumn 2024 Product Releases: What's New at Astra Security

As organizations grow and adopt cloud-native technologies, securing digital infrastructure at scale has become increasingly complex. According to the Cloud Security Alliance, 73% of organizations struggle to secure business-critical cloud applications due to misconfigurations and limited risk visibility. Ransomware alone can cost companies millions, and with the rise in cyber threats, even cyber insurance may not fully protect them from repeated attacks.

ElizaRAT and Beyond: The Evolution of APT36's Malware Arsenal

APT36, also known as Transparent Tribe, is a well-known cyber espionage group attributed to Pakistan. Active since 2013, this advanced persistent threat (APT) group has focused its efforts primarily on Indian government sectors, including defense, education, and key infrastructure. APT36 has demonstrated consistent sophistication in their tactics, evolving their methods to target a wide array of platforms and systems.

Evolution of Scalper Bots Part 5: The Rise of Retail Scalping

Welcome back to our Evolution of Scalper Bots series from the Netacea Threat Intel Center. In our previous blog, we reviewed the early days of anti-bot legislation and its limitations, especially around ticket scalping. Traditional defenses like CAPTCHA quickly became insufficient, which spurred the development of bot management solutions.

3 time-consuming security functions to automate in 2025

Our most recent State of Trust report found that 55 percent of global businesses think security risks for their organization have never been higher. Naturally, to mitigate an increase in risks in today’s complex threat landscape, businesses invest time and money in building a robust cybersecurity posture. But many security initiatives take a lot of time, money, and manual support to implement and maintain. This is a problem for a few reasons. Security budgets are tight.

Exploring the Security Risks of VR and AR

In an era where innovative technologies are emerging left, right, and center, two of the most influential in recent years are experiencing exponential growth. Virtual Reality (VR) and Augmented Reality (AR) are immersive technologies that have now firmly integrated into numerous industries. As these technologies have become more prevalent in our personal and professional lives, they bring with them security and privacy challenges that are hard to overlook.

The Rise of Security in Today's Technology Era

In today's connected world, security is one of the most crucial fears for both people and institutions. With the increase in internet use, digital transformation as well as new technologies such as cloud computing and the Internet of Things (IOT), cyber threat attack surface has increased substantially. Cybercriminals, hackers, and other malicious actors are increasingly faced with the need to secure these assets from them as more data and processes go online, thus making it a more complex endeavor.

How AI-Powered Digital Signage is Enhancing Customer Experience

In the early years of the 21st century AI digital signage software has become and is increasingly a transformative force in the way that businesses choose to interact with their customer. Businesses strive to create more personalized, dynamic experiences that cater to more individual needs and preferences in real time. Through analyzing gathered customer data and updating/adjusting content in response, retail spaces, hospitality venues and public transport hubs alike can be taken to the next level.
Featured Post

Building a Modern Identity Capability to Tackle DORA

Hackers are quickly taking advantage of every vulnerability in an organisation's armoury, particularly exploiting poorly managed identities. An organisation might have the strongest firewalls, encryption, anti-malware, vulnerability scanners, and risk management tools in the world, but if identities are not managed securely, this still leaves one critical gap in its cybersecurity arsenal.

Pegasystems Consolidates Endpoint, Identity and Cloud Security with CrowdStrike

Pegasystems, a global leader in AI-powered decisioning and workflow automation, is a strategic partner for many of the world’s leading brands. The company’s role as an enterprise software provider means it often operates under the radar of the general public — but that doesn’t shield it from cyberattacks. Upon joining Pegasystems (Pega) in 2019, Director of Corporate Security Operations Steve Tieland quickly realized the company's legacy antivirus solution was missing the mark.