Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Managing the Use of Access Links in SharePoint Online

SharePoint makes collaboration and sharing exceedingly easy — which can put sensitive and regulated content at risk. Accordingly, administrators need to put guardrails in place that facilitate appropriate sharing and prevent data leakage. In SharePoint Online, the primary way for a user to grant access to resources is to share an access link with other people.

Deceptive AI: A New Wave of Cyber Threats

As artificial intelligence (AI) technology advances, its influence on social media has become more and more pervasive and riddled with challenges. In particular, the ability for humans to discern genuine content from AI-generated material. Our recent survey conducted with OnePoll on over 2,000 UK workers found that a substantial portion of social media users are struggling to navigate this new digital frontier.

The Number of Email-Based Cyber Attacks Detected Surge 239% in 1H 2024

New data shows the most prevalent and obvious path into an organization – email – continues to be exploited by a growing number of cybercriminals. Email is one of those technologies that doesn’t seem willing to be replaced by collaborative tools that connect individuals and organizations – in many cases – in far more productive ways. And because of this, cybercriminals continue to leverage email to gain access to users.

Integrating PAM with SIEM: Enhancing threat detection and response

When we think about privilege access management (PAM), we typically think about it first as preventive control. PAM solutions manage who has privileged access to systems, enforce least-privilege principles and monitor and record privileged user activity. This is crucial for preventing misuse of high-level permissions and ensuring accountability.

Future-Proofing Cybersecurity: 5 Insights from the Verizon MSI

Your organization’s most vulnerable points of attack are no longer desktops — they’re in the pockets of your employees. Virtually everyone has a mobile device. And, even on the job, we use them for a multitude of tasks. As a result, our devices are packed with critical information, making them rich targets for cybercrime. That crime comes at a high cost.

Yellow Card Integrates Fireblocks to Streamline Cross-Border Transactions in Africa

Fireblocks has launched support for Yellow Card, Africa’s leading stablecoin on/off ramp, to improve cross-border transactions for both businesses and individuals. By integrating the Fireblocks digital asset infrastructure, Yellow Card seeks to remove obstacles for global corporate treasury in accessing African markets by offering secure and effective on-chain solutions.

Google Fixes Actively Exploited Chrome Vulnerability

Google has recently released an urgent security update to fix a high-severity vulnerability in its Chrome browser. This flaw, identified as CVE-2024-7971, has been actively exploited by attackers, posing a significant risk to users. The vulnerability, rooted in the V8 JavaScript and WebAssembly engine, could allow remote attackers to execute harmful code via specially crafted web pages. As cyber threats continue to evolve, it is crucial for users to stay informed and ensure their browsers are up to date.

Advanced Android Malware Targets NFC Data for ATM Cashouts

A new strain of Android malware has emerged, targeting victims' card details and utilizing near-field communication (NFC) technology to facilitate unauthorized ATM withdrawals. This sophisticated crimeware, active since March 2024, has already impacted customers of three major Czech banks.

Cloud Security And Privacy: Best Practices To Mitigate The Risks

Cloud security refers to technologies, best practices, and safety guidelines that help to protect your data from human errors, insider and security threats. Therefore, it naturally covers a wide range of procedures, which are aimed at securing systems from data breaches, data loss, unauthorized access, and other cybersecurity-related risks that are growing from year to year.

Top 10 Cyber Risk Assessment Tools

Estimating the potential impact of a successful cyber attack may seem impossible, especially given the rapid expansion of organizations’ digital footprint (and, consequently, their attack surface). One example are attacks which pertain to the contact points between businesses and clients, such as websites and mobile apps. In particular, these assets can be cloned and used for phishing attacks.