Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Protect Your Devices: Mobile Phishing Attacks Bypass Desktop Security Measures

Zimperium warns of a surge in phishing attacks specifically tailored for mobile devices. These attacks are designed to evade desktop security measures in order to breach organizations through employees’ smartphones. Mobile phishing includes SMS phishing (smishing), QR code phishing (quishing), voice phishing (vishing), and mobile-targeted email phishing.

Error Message Vulnerabilities: Why They Matter and How to Prevent Them

Ever get one of those annoying error messages on your phone that gives way too much detail? You know, the ones that tell you the line of code that failed or the exact database query that crashed the app. As an app user, you may dismiss the message and move on. But did you know those overly verbose error messages could be exposing your personal data?

Gartner's AI TRiSM Market Guide Validates the Urgency of AI Agent Security

AI Agents are not just another tech trend; they are fundamentally reshaping how enterprises operate. These autonomous systems are deeply embedded into workflows, making real-time decisions, executing tasks, and integrating across an organization’s most critical systems. With this shift comes an undeniable reality: enterprises are handing over operational control to AI-driven entities without the necessary governance and security frameworks in place.

Why Pen Testing Is Essential in Today's Cyber Threat Landscape

The digital frontier is expanding quickly, with organizations across every industry depending on interconnected systems to communicate, store data, and drive innovation. However, as technology evolves, malicious actors also refine their tactics. This article examines key defenses that protect today's infrastructures.

Effective risk management and controls remediation planning

Organizations face an increasingly complex landscape of risks in a business environment. From cybersecurity threats to regulatory challenges, the need for robust risk management and effective controls remediation has never been more critical. This article explores the vital process of control remediation planning, offering a strategic roadmap for mitigating risks, enhancing compliance, and safeguarding organizational success.

Building High Availability into a Large Cloud SQL Fleet, Part 2: Optimizations and Design Choices

At Rubrik, we rely on a multi-tenant architecture to store customer metadata in a large fleet of Cloud SQL database instances. With numerous production deployments globally, each supporting multiple customer accounts, maintaining high availability, performance, and robustness across this infrastructure is critical. Managing a large fleet of Cloud SQL instances and ensuring they remain resilient and performant has been a journey filled with valuable lessons.

Beyond AWS Native Backup: A Simpler Path to Data Protection

We are often asked how Rubrik Security Cloud differs from AWS Backup. It's a valid question because, at first glance, the two solutions seem similar. Both have cloud-first, API-driven architectures. Both are built specifically to ensure reliable backup and recovery for data stored across AWS. Both support a wide range of the most popular AWS workloads including EC2, EBS, S3, RDS and EKS.

[PCI DSS Requirement 10] : Summary of Changes from Version 3.2.1 to 4.0 Explained

Did You Know? 74% of organizations face challenges in meeting PCI DSS compliance due to evolving security threats. Over 60% of data breaches involve weak or compromised credentials—making Requirement 10 more critical than ever. Are you struggling to keep up with the latest PCI DSS 4.0 updates? In this video, we break down the critical changes in Requirement 10, focusing on log management, monitoring, and security event tracking—essential for protecting cardholder data.

Using Metadata for Proactive Threat Hunting

Organizations want to stay on top of cyber threats and detect them even before they occur. To do this, they need to detect threats and anomalies in their networks as quickly as possible. This is what we call threat hunting. It is a tool to help organizations constantly monitor their networks to detect and mitigate threats to keep them at a distance.