Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

The Dark Side of Loyalty: Combating $1 Billion Frequent Flyer Mile Scams in the Airline Industry

Frequent flyer programs have long been a symbol of loyalty and reward in the airline industry. These programs are intended to reward travelers with benefits and encourage ongoing customer relationships. However, a growing and pervasive threat is lurking beneath the allure of free miles and exclusive perks: Frequent Flyer Miles fraud. At the last credible count in 2018, there were over 30 trillion unspent miles in circulation, according to McKinsey.

How our new engine framework helped address the critical CUPS vulnerability within the day

When a critical vulnerability in the printing system CUPS started raising alarms among security teams, Detectify had already entered war-room mode to address the situation. Within the day, customers could test whether they were vulnerable thanks to the rollout of a new scanning engine framework that reinvents how Detectify operates under the hood, allowing for a faster and more efficient response to security threats.

How to increase cyber resilience

Making your organization’s attack surface lean and agile improves your cyber resilience and demotivates bad actors. The first step to avoid cyber attacks is to get your attack surface in order. The Sweepatic External Attack Surface Management (EASM) Platform is built to help you with building cyber resilience. It lists, structures and prioritizes observations by criticality. 67%

How to Budget for EASM

External Attack Surface Management, or EASM, has become a necessary component of a proactive cybersecurity strategy. According to research from Enterprise Strategy Group, over 65% of breaches stem from a compromised, externally exposed asset, so knowing your attack surface is key to avoiding breaches. Gartner, for this reason, is recommending EASM as a key pillar in the new approach to proactive security they call Exposure Management.

Akira Ransomware: Published Over 30 New Victims on their DLS

The Akira ransomware group has been active since March 2023, targeting diverse industries across North America, the UK, and Australia. Operating as a Ransomware-as-a-Service (RaaS) model, Akira employs a double-extortion strategy by stealing sensitive data before encrypting it. According to their leak site, the group claims to have compromised over 350 organizations.

How Test Automation Tools Enhance Software Quality Assurance

The software industry evolves very rapidly, and there is an immense need to ensure that the delivered software product is of good quality. Manual testing is time-consuming, prone to errors, and difficult to scale, making it challenging for teams to meet tight deadlines without compromising quality. Here, test automation tools come into play, as they improve testing processes in terms of accuracy and ensuring quality. This article explores how automation testing tools enhance software quality assurance across various tool categories and their specific benefits.

How to Evaluate Remote Software Engineering Job Offers in South Asia

The whole job market scenario has changed with the introduction of remote working, and software engineers in South Asia have a lot of opportunities. With firms continuing to adopt remote working cultures, professionals in countries like India, Pakistan, and Bangladesh have opened up their doors to opportunities ranging from global tech giants down to innovative startups. Particularly, India has emerged as a hub for remote software engineering with its rich talent pool and one of the fastest-growing tech industries.