Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Phishing with Cloudflare Workers: Transparent Phishing and HTML Smuggling

Netskope Threat Labs is tracking multiple phishing campaigns that abuse Cloudflare Workers. The campaigns are likely the work of different attackers since they use two very different techniques. One campaign (similar to the previously disclosed Azorult campaign) uses HTML smuggling, a detection evasion technique often used for downloading malware, to hide the phishing content from network inspection.

What is SQL Injection? SQLI Prevention and Mitigation

SQL Injection is a kind of cyber-attack based on targeted databases by submitting malicious SQL code instead of input on web application fields. This code is created with the purpose of affecting the structure of the database query that the application interacts with the backend database, thus making it vulnerable to hackers who can breach its security, modify data or carry out malicious actions.

Cato Networks' Impact and analysis of CVE-2024-3661 - "TunnelVision" VPN vulnerability

On May 6th, 2024, researchers from the Leviathan Security Group published an article detailing a technique to bypass most VPN applications, assigned as CVE-2024-3661 with a High CVSS score of 7.6. Researchers have labeled this technique ‘decloaking’ as while the VPN tunnel remains connected, it allows attackers to trick many VPN clients into sending traffic via a side channel and not through the encrypted tunnel.

Mitigating Data Poisoning Attacks on Large Language Models

Large language models (LLMs) have experienced a meteoric rise in recent years, revolutionizing natural language processing (NLP) and various applications within artificial intelligence (AI). These models, such as OpenAI's GPT-4 and Google's BERT, are built on deep learning architectures that can process and generate human-like text with remarkable accuracy and coherence.

Transform Collaboration with the Power of Egnyte and Microsoft Copilot in Microsoft Teams

As part of our ongoing partnership and investment in Microsoft, we have deepened our integration with Microsoft's Copilot within Microsoft Teams. This integration expands Copilot's capabilities by incorporating Egnyte as an additional data source. Microsoft 365 Copilot users can now derive valuable insights from documents stored in Egnyte, enhancing the usefulness of both Egnyte and the Microsoft Copilot solution for joint customers.

Enterprise Management Associates Report: Information Security and Compliance Future Trends 2024

The cybersecurity industry has seen radical changes over the past year–changes that may alter the trajectory of the industry. In partnership with analyst firm Enterprise Management Associates (EMA), today Keeper announces Information Security and Compliance Future Trends 2024, a report that analyzes recent research and industry data to highlight key shifts in the cybersecurity industry and offer insights into current trends and future directions.

Fireblocks Delivers Enterprise-Grade Custodial Solutions to Gunzilla Games

Fireblocks is pleased to announce its integration with Gunzilla Games to provide advanced custodial solutions for institutional clients and non-custodial wallet options for over 100 million users on the GUNZ blockchain, enhancing the security and autonomy of digital assets within the gaming sector.

Explore the importance of dark web monitoring in enhancing organization cybersecurity and mitigating potential risks

Understanding the Dark Web and its Threats The dark web refers to a part of the internet that is not indexed by search engines and requires specific software, such as Tor, to access. It is a breeding ground for illegal activities, including the sale of stolen data, hacking tools, drugs, and other illicit goods. Organizations need to understand the threats posed by the dark web in order to effectively protect their sensitive information and prevent cyberattacks.