Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is a Remote Access Trojan (RAT)?

A Remote Access Trojan (RAT) is a type of malware that enables an attacker to gain remote access over an infected system. Once a machine is compromised by a Remote Access Trojan, your system is at high risk of covert surveillance, data exfiltration, and other methods of malicious remote compromise. This article defines what a Remote Access Trojan (RAT) is and how you can take action to protect your system with UpGuard BreachSight.

Simplifying Government Data Protection for Kubernetes with CloudCasa

In the realm of government institutions in Brazil, regional electoral courts hold a pivotal role in ensuring the integrity of the electoral process. These institutions are mandated to safeguard their essential electoral data through off-site backup solutions. While Kubernetes’ efficiency and flexibility hold great promise for modernizing operations, government data protection challenges have deterred many regional electoral courts from embracing this technology.

How to Choose the Right MSSP: 5 Essential Criteria

In an era where businesses rely heavily on technology and digital infrastructure, the need for robust cybersecurity measures has become paramount. Organizations are constantly under the threat of cyberattacks. To combat the evolving threat landscape effectively, many businesses turn to Managed Security Service Providers (MSSPs) for expert assistance. In this blog post, we will present you with five crucial criteria to confidently guide you through the MSSP selection process.

Vulnerabilities in Multi-Factor Authentication and How to Address Them

Multi-factor authentication is an authentication method that asks for two or more authentications from users to get access to a resource or any device. Multi-factor authentication is also known as two-factor authentication, or 2FA. Generally, hackers gain access to a single authentication, such as a password; however, it is quite difficult to break the two-factor authentication.

MOVEit Hackers Intercept Data and SSNs from Nuance Communications

Nuance Communications is a Microsoft-owned software solutions provider employing more than 6,500 people. Nuance controls industry-defining AI, which professionals may use to fully automate tasks, such as entering and manipulating medical records. Many of Nuance’s clients are hospitals, clinics, and health centers in the southeast of the US; those who have received medical services in these areas are now at risk following the most recent MOVEit data breach.

Understanding GDPR Vendor Management and Compliance for your Business

General Data Protection Regulation (GDPR) is a framework for data protection that gives strict obligations for organizations within the European Union. For many businesses, understanding and implementing GDPR vendor management is a daunting task. That’s why we are going to break down what GDPR vendor management is, who is involved in it, and what the requirements are.

How to Discover and Secure Open Port Vulnerabilities

Open port vulnerabilities pose a significant security risk to your organization. If left exposed, ports are a gateway for hackers to breach your network and steal your data. But what are open ports, why are they a security risk, and what can you do to close open port vulnerabilities? Let’s answer your open port questions.

Cyber Threat Modelling

Do you model Cyber Threats, depict likely attack scenarios via Attack Trees and provide those findings back in a succinct manner to those responsible for the risk(s)? Surely that’s for the proviso of large companies, with big budgets and oodles of staff? I hear you say… Perhaps, but any organisation large or small can start to model their Cyber Threats. Why?

2023 OWASP Top-10 Series: API10:2023 Unsafe Consumption of APIs

Welcome to the 11th post in our weekly series on the new 2023 OWASP API Security Top-10 list, with a particular focus on security practitioners. This post will focus on API10:2023 Unsafe Consumption of APIs. In this series we are taking an in-depth look at each category – the details, the impact and what you can do about it.

How Technology Can Enhance Security and Management in Prisons

In the United States, over 3,000 jails operate in relative obscurity, and they admit roughly 10.3 million individuals each year. It's a hidden population, often overlooked by the public eye. Yet, the impact of these annual jail admissions ripples through lives, families, and communities, causing profound harm and disruption. Amid this complex challenge, technology emerges as a promising force. It promises to transform the landscape of prison management and security, offering innovative solutions to age-old problems.