Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A Hitchhiker's Guide To Cross-border Data Protection

Imagine doing business in a bubble. You are an international company only allowed to make decisions using data collected within your country and by your business unit (BU). You also cannot share data with subsidiaries or third parties. It would be challenging to conduct day-to-day business, let alone innovate and grow. Fortunately, this isn’t the state of business today. Organizations transfer trillions of data points across borders daily.

How SD-WAN Solves 3 Key Retail Challenges

The past three years have been challenging in many ways for the retail industry, and this uncertain reality isn’t going anywhere. The industry continues to face challenges; the cost-of-living and energy crisis, and expected period of economic downturn, are understandably unsettling for all sectors, with retail particularly hard hit in a recessionary period.

Raccoon Stealer Announce Return After Hiatus

First observed in 2019 and advertised (Figure 1) as a ‘Malware-as-a-Service’ (MaaS) threat on various cybercriminal forums, Raccoon is an information stealer targeting victim credentials and cryptocurrency wallets. Seemingly favored by some threat actors due to its simplicity, the malware element of Raccoon omits advanced features, such as those used to evade detection, and instead focuses on the ‘stealer’ task in hand.

Preventing XSS in Django

Cross-Site Scripting (XSS) is a type of vulnerability that involves manipulating user interaction with a web application to compromise a user's browser environment. These vulnerabilities can affect many web apps, including those built with modern frameworks such as Django. Since XSS attacks are so prevalent, it's essential to safeguard your applications against them. This guide discusses how XSS vulnerabilities originate in Django apps and what you can do to mitigate them.

A Developer's Checklist To Curate Secure Software

Developing software requires immense focus on functionality and especially on its security. According to Intrusion Inc. cost of cybercrimes is increasing at a rapid speed and will cost around USD 10 Trillion. In addition, HackerOne has also issued a report, defining an increase of 65,000 vulnerabilities in different applications and development platforms. In addition, 50% of hackers don’t even report the vulnerability and take advantage for an extended period or until you patch it.

Over 9 Million AT&T Customers Exposed in Recent Cyber Attack

AT&T is a massive telecommunications company with its headquarters in Dallas, Texas. The company is known as the largest telecommunications company in the world according to its revenue, and it is the third-largest mobile phone service provider in the United States. The company recently suffered an attack that exposed some of its customer data to hackers and may have put customers at risk. The attack wasn't on AT&T directly but on one of the company's external marketing vendors instead.

Insights from an external incident response team: Strategies to reduce the impact of cybersecurity attacks

"Why are you here if you cannot decrypt our data?" This is how people sometimes react to the arrival of the external incident response team. In this article, I will try to answer this question, but at the same time, I am going to describe the stages of incident response, list the main mistakes that play into the hands of hackers, and give basic advice on how to respond.

How Can GRC Teams Leverage Cyber Risk Quantification?

Being part of a governance, risk, and compliance (GRC) team is no easy task, as you have to stay on top of evolving expectations and laws, while connecting different business units together in a way that makes sense to other stakeholders. One area that’s been particularly tough to manage recently has been cybersecurity. From new data security standards to heightened risks around areas like ransomware, GRC teams have their hands full.