Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Protect Your Personal Data: Three Privacy Tips To Stay Ahead

Technology has advanced our world in countless ways. Every day we bank, shop, conduct business, and exchange photos and messages with family and friends online. While digital devices and services offer great convenience, they also pose risks to our data and privacy as our offline and online lives converge. In 2021, data breaches reached an all-time high of 1,862, according to the Identity Theft Resource Center (ITRC), a 68% increase over 2020.

The Top Cyber Attacks of September 2022

Maybe it’s the changing of the seasons, the start of a new school year, or just something in the air, but September’s cybersecurity landscape was marked with high-energy hacks that seem to have served as twisted amusements for their perpetrators. This month’s round-up is full of criminals who weren’t content just to collect a ransom or sell some private data. These hackers wanted to scorch the earth and hurt their victims with an extra layer of malice and humiliation.

RedLine Stealer Campaign Abusing Discord via PDF Links

RedLine is an infostealer malware discovered in 2020. Often sold in underground forums, it is capable of stealing data such as credit card numbers, passwords, VPN and FTP credentials, gaming accounts, and even data from crypto wallets. In May 2022, Netskope Threat Labs analyzed a RedLine stealer campaign that was using YouTube videos to spread, luring victims into downloading a fake bot to automatically buy Binance NFT Mystery Boxes.

Why Security Should be Design Principle Number One

National Cybersecurity Awareness Month (NCSAM), held every October, highlights a key theme each year. For 2022, the theme is: “See Yourself in Cyber.” Cybersecurity is more than a set of principles or tools—people are a major component, helping keep businesses safe by complying with multi-factor authentication, using strong passwords, keeping devices updated with the latest software, not installing unapproved software on devices, and reporting phishing.

Are You CODEfident?

We’ve been watching the global transition to an app-driven world for some time now, as companies develop and deploy innovative software at warp speed. And we’ve also watched application security teams struggle to keep up. Many try to use yesterday’s tools for today’s AppSec reality, while others wrestle with immature application security programs. And that’s when we realized: modern application security programs are different. They run on CODEfidence. Let me explain.

3 Services That Improve Your Security Posture

Besides KPIs and ratings to measure and quantify risk, you need to have a team of experts available 24/7, who you can rely on to help fix the worst problems. Put these four services in your cybersecurity toolbox: If a ransomware attack happens in the middle of the night on the weekend, you must be able to call somebody 365 days a year to help you recover and figure out how to get back up to speed. If you get breached, how do you diagnose how an attacker got in? You need to have experts who can go on your site and understand how attackers penetrated the defenses.

Establish an Efficient DLP Policy With These 5 Best Practices

Strong data loss prevention requires two things: a strong policy that guides user actions and permissions, and the tools to monitor and manage data security. Many organizations know they need to invest in software, platforms, and other security settings to create secure networks, endpoints, and cloud settings. But not every organization has a strong DLP policy to guide these tools. Many compliance regimes require companies to record data loss prevention policies.