Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Attackers Abuse DocuSign API to Send Authentic-Looking Invoices At Scale

In a concerning trend, cybercriminals are leveraging DocuSign's APIs to send fake invoices that appear strikingly authentic. Unlike traditional phishing scams that rely on deceptively crafted emails and malicious links, these incidents use genuine DocuSign accounts and templates to impersonate reputable companies, catching users and security tools off guard.

Leveling up the 1Password Developer experience

The 1Password desktop apps now include the option to show a dedicated developer section, accessible from the sidebar. The next time you open 1Password for Mac, Windows, or Linux, the built-in SSH Agent, 1Password CLI, and Developer Watchtower will be a click away.

CVE-2024-10443: Critical Zero-Click RCE Vulnerability Discovered in Synology NAS Devices

On November 1, 2024, details of a critical vulnerability affecting Synology NAS devices, which had been patched a few days earlier, were publicly disclosed. This vulnerability, tracked as CVE-2024-10443 is classified as a zero-click flaw, meaning no user interaction is required for exploitation. The issue originates from the SynologyPhotos application, which comes pre-installed and enabled by default on Synology’s BeeStation storage devices and is also widely used among DiskStation users.

Office 365 DLP: Securing Your Data with Data Loss Prevention

Data breaches happen every day, so companies need to make data security a top priority to keep private data safe and make sure they follow the rules. Data Loss Prevention (DLP) in Office 365 is a powerful tool that finds, monitors, and protects sensitive data across all platforms. This makes an organization's security stronger. Office 365 DLP helps businesses keep private data from being shared or exposed without permission.

Seven Use Cases for Remote Browser Isolation (RBI)

It’s important to know that not all Remote Browser Isolation (RBI) solutions address the same use cases. Some use cases a good RBI solution solves include monitoring third-party access to systems, auditing browser activity, enabling secure Bring Your Own Device (BYOD) and extending zero trust to browsers. Continue reading to learn what RBI is and explore some of its most common use cases.

Dark Web monitoring: The linchpin of External Risk Management

The typical Security Operations Center (SOC) faces a wide variety of responsibilities. In addition to monitoring internal systems for signs of threats and breaches, modern SOCs are tasked with managing external risks through practices such as: Each of these practices addresses different types of risks, and it would be wrong to say that any one practice is fundamentally more important than the others.