Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

Top tips: Notorious session sniffing attacks and tips for avoiding them

In cybersecurity, session sniffing—an attack method where attackers receive and use session data—is a recurring danger. The impacts of session sniffing are evident from numerous high-profile assaults. Let’s discuss some of these important cases that highlight the significance of strong security procedures.

Penetration Testing for Web Applications vs Websites

In today’s digital landscape, ensuring the security of both web applications and websites is paramount. As cyber threats become more sophisticated, organisations must employ robust security measures to protect their assets. Penetration Testing is a critical strategy used to identify vulnerabilities and strengthen defences. However, the approach to Penetration Testing can vary significantly between web applications and websites.

Navigating the Future of SIEM Detections: Balancing Signature-Based and AI-Driven Approaches

In the early days of cybersecurity, implementing a Security Information and Event Management (SIEM) system was akin to constructing a house from scratch. The SIEM was a blank slate, and transforming raw data into actionable insights was a long and arduous journey. It began with the daunting task of ingesting data from various disparate sources and formats. From there, security teams had to craft detections — rules designed to identify malicious or suspicious activity.

TrustCloud Product Updates: August 2024

Our teams are always hard at work improving the TrustCloud platform. Here are this month’s biggest updates. Introducing our ServiceNow integration! This is a bidirectional integration with ServiceNow to pull ticket details into TrustCloud. Teams can create new ServiceNow tasks in TrustCloud and attach ServiceNow links as evidence to your tests. The integration also supports automatic task creation from TrustCloud. Just go to Admin -> Connected Apps, where you can automate task creation.

Incident Response Testing: An Australian Perspective

In today's rapidly evolving digital landscape, organizations must be prepared for the inevitable occurrence of cybersecurity incidents. Incident response testing is a critical component of a robust cybersecurity strategy, ensuring an organization can swiftly and effectively respond to incidents when they occur.

Effective Network Operations Require a Digital Twin Platform, Not a Toolbox

Tool sprawl is an expensive aspect of technical debt. IDC recently found that 43% of organizations doing business in the Americas have 500 or more software applications in their portfolios today (Application Services — Worldwide Regions, 2023, IDC #US50490416, April 2023). In the area of monitoring and observability tools alone, 50% of companies reported having between 11 and 40 tools.

How Do You Know if Your Facebook Has Been Hacked?

You can tell if your Facebook account has been hacked if you receive login attempt notifications, notice your account’s personal information has been changed, see an increase in suspicious messages or have trouble logging in to your account. Since Facebook accounts hold a large amount of private information, you need to recover your account quickly if it’s been hacked.

How To Tell if There Is Spyware on Your Laptop

Spyware is a type of malware that can be installed on your device without your knowledge. The main goal of spyware is to spy on you and gather your private information, like passwords or credit card information. Despite spyware being elusive and undetectable at times, you can tell if there is spyware on your laptop by recognizing common signs. Some of these signs include unwanted pop-up ads, slower performance, shorter battery life and redirections on your browser.

Identity Governance: Balancing Cost Reduction with Effective Risk Management

In today’s business environment, cost reduction is a top priority for many organizations. Companies are increasingly adopting technologies that automate tasks and enhance efficiencies to achieve cost savings. However, minimizing risk should also be a key objective for every business.

Tickler Malware: APT33's Latest Cyber Weapon Targets U.S. Government and Defense Sectors

In a recent cybersecurity alert, the infamous Iranian hacking group APT33 (also known as Peach Sandstorm and Refined Kitten) has unleashed a new form of malware named "Tickler" to compromise the networks of various organizations across critical sectors in the United States and the United Arab Emirates. This latest campaign, observed between April and July 2024, has primarily targeted government, defense, satellite, and oil and gas industries.