Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

How Attackers Use APIs to Disguise Bots as Games Consoles

Attackers and bot authors are continually evolving their methods, shifting their focus beyond just websites. With websites often having a reasonable level of protection, malicious actors are increasingly targeting less-protected areas, namely APIs, with their bots. This blog post delves into the evolving threat landscape. We’ll focus on how attackers exploit APIs and IoT devices to launch attacks like credential stuffing, using streaming services as a prime example.

August 2024 Update: UX... we did it! GitProtect 1.8.0 introduces a completely NEW onboarding experience

Welcome to our post-release blog post where we share the latest GitProtect enhancements and new features launched with version 1.8.0. Although we believe that these changes could not have been missed!

Four easy ways to analyze your Java and Kotlin code

Nowadays, the security of your applications is just as important as the functionality they provide. Therefore, analyzing your code for security vulnerabilities is a vital part of maintaining the integrity of your applications and protecting your users' data. As developers, we are at the front lines of this battle. It's our responsibility to ensure that the code we write is not just functional and efficient but also secure.

Zero Trust: The Paradox Helping CISOs Enable Their Business

As we reflect on the first half of 2024, it seems to me that two defining features so far have been a litany of significant cyber attacks on companies across every sector, and widespread adoption of AI tools as businesses seek to innovate. At the heart of this storm of cyber threats is the CISO, looking to guide their business safely through potential dangers. Last month, Netskope undertook research examining how CISOs view their role and asking how they’re approaching these challenges.

Enhancing Cybersecurity Collaboration: ThreatQ Data Exchange and Native TAXII

In today’s rapidly changing cybersecurity environment, organizations must share threat intelligence efficiently and effectively to stay ahead of potential threats. Recognizing the critical need for seamless collaboration, ThreatQ provides native support as a TAXII Server within its ThreatQ Data Exchange. This feature allows Authorized TAXII Clients to access and benefit from shared threat intelligence, enabling the creation of larger, more robust cybersecurity communities.

Octiga secures France & French speaking distribution with Watsoft

We’re delighted to announce that Octiga, the multi-tenant Microsoft 365 security platform for MSPs, is now available to MSPs and MSSPs operating in France and French speaking African territories. Bordeaux based Watsoft, a French value-added IT distributor, is now Octiga distributor for these regions.

RansomHub: The New Kid on the Block to Know

The ransomware group – RansomHub – has emerged as a significant player in the ransomware landscape, making bold claims and substantiating them with data leaks. It emerged after the Federal Bureau of Investigation (FBI) disrupted ALPHV’s ransomware operation on December 19, 2023. There are assumptions that RansomHub is the “spiritual successor” of ALPHV group that operates with the help of former ALPHV affiliates.

Top Reasons to Invest in Aluminum Gates

When it comes to securing your home while maintaining an attractive exterior, aluminum gates are an exceptional choice. Whether you have a modern or traditional home, aluminum fences provide the perfect balance between security and aesthetic appeal. At Aluglobus Fence, we specialize in crafting custom aluminum gates that offer both style and durability, ensuring your home remains safe and welcoming.