Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Lookout Expands Partnership with Cloud Security Platform to deliver SSE to Verizon Business Customers

With nearly every organization going through rapid digital transformations, it has become critical that security teams are equipped to provide seamless access for their remote users while keeping sensitive data secure. This is why I’m thrilled that Verizon has launched the Lookout suite of cloud security solutions to deliver security service edge (SSE) and ensure that customers can seamlessly secure their data and apps in the cloud, on premises and on the internet.

5 Ways Identity Verification can help Airlines to ensure seamless operation and digital transformation

Digitalization is not a new term anymore, and it’s surely never going to fade away as it has etched its space in every sector. The optimistic business transformation it brought compelled almost everyone to incorporate digitalization processes into their business operation. Every industry realized that to proceed with the ongoing business profit and to compete in the market, they must adapt to the latest digital technology.

Explaining the csurf vulnerability: CSRF attacks on all versions

On September 11th, 2022, Snyk published a vulnerability report for the popular CSRF token management csurf npm package. The vulnerability impacts all known versions, which are currently yielding more than 400,000 downloads per week. The vulnerability report is based on the public disclosure by security consultant Adrian Tiron and their write-up on the Fortbridge blog.

Wireless Network Assessment or Wi-Fi Hacking

Wireless network technology is widely used but at the same time, it has many security weaknesses. Several reports have explained weaknesses in the Wired Equivalent Privacy (WEP) & Wi-Fi Protected Setup (WPS) to encrypt wireless data. Before understanding the benefits of Wireless Network Assessment it is necessary to know what it is, why it is needed, how the service works and what you get from the service.

Penetration testing is in the eye of the beholder

"Beauty is in the eye of the beholder." A famous phrase known to all indicates that our perceptions influence our definitions. The same can be said about penetration testing. Often when clients approach us for what they believe to be a penetration test, their definition and needs do not necessarily meet the accepted approach of those within the security field.

Refund Fraud-as-a-Service: What it means for eCommerce businesses

eCommerce is a trillion-dollar industry. But as the popularity of online shopping grows, so does the risk of refund fraud, which now costs businesses more than $25 billion every year. Refunds are a standard cost of retail — especially in eCommerce. But online shopping makes it much more difficult for businesses to investigate and verify valid refund demands from customers. Some customers take advantage of these difficulties by committing refund fraud.

Looking back at Black Hat USA 2022

For the past few days, I’ve been getting a lot of messages asking about my experience at this year’s Black Hat USA. So in this post, I’ll be recapping the conference to give you an inside look at what was presented and provide some helpful perspective. Black Hat is one of the largest — and most talked about — cybersecurity conferences. Its inception dates back to 1997.

Spear Phishing Triage Using ThreatQ and TDR Orchestrator

According to Proofpoint’s 2021 State of the Phish Report, more than 80% of organizations fell victim to a phishing attack last year. Another report from PhishMe found that 91% of cyberattacks start with a phish, and the top reasons people are duped by phishing emails are curiosity (13.7%), fear (13.4%), and urgency (13.2%), followed by reward/recognition, social, entertainment, and opportunity.