Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The troubles of being on Cloud9: Why your browsers are not safe

With the new browser botnet, Cloud9, waiting to penetrate your browsers remotely to access and steal your sensitive and confidential data, it can be challenging to stay safe while browsing the internet. As reported by Bleeping Computer, this Remote Access Trojan named Cloud9 allows cyberattackers to execute commands remotely to steal your data. This malicious extension is not found in the Chrome store, but has been reported to be installed by other means. What’s the story of Cloud9?

Interview With Founder Jacob Hess

For the next interview in our series speaking to technical leaders from around the world, we’ve welcomed Jacob Hess, Founder at NGT Academy. Jacob Hess is the co-founder of NGT Academy, an immersive, military-grade cybersecurity and IT professional training platform founded by former military technicians from the US Air Force that has equipped thousands of military engineers with top security clearances.

How Did Plex Get Hacked in 2022?

‍Plex was breached by an unauthorized third-party gained who gained access to a proprietary database. The specific attack vector that facilitated the breach hasn’t been disclosed. According to Plex, cybercriminals “tunneled” their way through sophisticated cybersecurity mechanisms to gain access to sensitive customer data.

Top Myths About Password Security

A study by Google reveals that about 75% of Americans feel frustrated about passwords, so it’s easy to understand why people would adhere to common “guides” about password security. You need to be careful about misinformation and what counts as good password hygiene. In this blog, we discuss nine popular myths and misconceptions about password security, the right approach to password security and the importance of deploying password managers.

Lookout and Fortra Partner to Secure Sensitive Data Across the Enterprise

The first steps for any organization in creating a data security strategy are accurately identifying all of their sensitive information and securing that data from unauthorized access, regardless of where it resides. This is why I’m excited to announce the integration of Titus and Boldon James, leading data classification systems from Fortra (formerly HelpSystems), with the Lookout security service edge (SSE) solution.

6 ways you can protect yourself from fraud this Christmas 2022

Since 2018, identity fraud rates have risen by up to 15% year on year throughout November and December, as criminals try to take advantage of an increase in online transactions, lowering businesses’ capacity to investigate suspected fraud and access credit using stolen personal information. The issue grows more acute around the holiday season, with incidents increasing over the previous four years to attempt to obtain credit using stolen personal information.

Important Takeaways from the Orange and Netskope Partnership

Recently, Orange Business Services, Orange Cyberdefense, and Netskope announced a global partnership to deliver a fully integrated secure access service edge (SASE) solution on the Orange network. The partnership includes the deployment of Netskope data planes inside the Orange network to provide a full stack of security service edge (SSE) services that will be available from both the New Edge network and Orange’s world-class connectivity services.

Why Threat Intelligence Matters To Your Organization?

Technological advancements have revolutionized the world’s cultural and economic institutions in almost every aspect. Unfortunately, they have also brought risks in the form of cyber threats. While there are various ways to mitigate such threats, paying importance to threat intelligence can make a difference to your organization.

The Increasing Threat Posed by Hacktivist Attacks: An Analysis of Targeted Organizations, Devices and TTPs

This year has seen an enormous increase in the number and claimed impact of hacktivist attacks on critical infrastructure and enterprises operating in critical services. Many attacks target unmanaged devices such as Internet of Things (IoT) and operational technology (OT) equipment. Attacks are motivated by geopolitical or social developments across the globe, with the goal of spreading a message or causing physical disruption.