Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

UpGuard's Cyber Risk Ratings: Enhancing Risk Categorization for 2024

Each year, we revisit our risk rating system to ensure it best reflects the needs of security practitioners safeguarding their organizations and supply chains. For our 2024 update, we’ve made two closely related changes: we’ve recategorized some of our existing findings to make an organization’s risk profile more understandable and recalibrated our scoring algorithm to more clearly illustrate the impact of specific risks.

Windows Vulnerability Exploited Using Braille 'Spaces' in Zero-Day Attacks

A recently addressed Windows MSHTML spoofing vulnerability, tracked as CVE-2024-43461, has been revealed to have been actively exploited in zero-day attacks by the Advanced Persistent Threat (APT) group, Void Banshee. Initially unmarked as exploited, Microsoft later updated its advisory to confirm that the vulnerability had been abused in attacks prior to its fix.

Meet Snyk for Government: Our developer security solution with FedRAMP ATO

The Snyk team is excited to announce that our FedRAMP sponsor, the Center for Medicare and Medicaid (CMS), has granted authorization (ATO), enabling their teams to leverage our public sector offering, Snyk for Government (SFG). This stage signifies that we are almost at the finish line of the FedRAMP process and points to our continued investment and support of public sector organizations in their application security efforts.

SAP Users: Prevent leaks during closed accounting periods with HaloCORE

There’s no ‘good’ time for a data breach, but accidentally leaking sensitive information during closed periods leads to heavier financial and reputational costs than at other parts of the year. As SAP holds public companies' most sensitive financial and HR data, executives must guarantee the security of thousands of SAP downloads or face non-compliance fines and legal repercussions.

AI in cybersecurity 101: The economics of bot vs bot battles

If you run an online image search for “cyber hacker,” you’ll likely find countless pictures of shadowy, hooded figures hunched over a laptop. There’s just one problem with those search But here’s the catch: The image of a human hacker is in the minority these days.

Data Security in AI Systems: Key Threats, Mitigation Techniques and Best Practices

Artificial Intelligence (AI) has evolved into a vital part of modern businesses. Its reliance on large amounts of data drives efficiency and innovation. However, the need for data security in AI systems has grown critical with this increasing dependence on AI. Sensitive data used in AI must be protected to avoid breaches and misuse. This post will explore critical threats to AI data security, discuss mitigation techniques, and present best practices to help organizations safeguard their AI systems.

Insider Threats: The Danger Within

Cyberattacks by hacking groups using ransomware and other tactics dominate the headlines, but the risks posed by individuals within an organization can be just as, if not more, damaging. CISA defines an insider threat as the possibility that authorized personnel will use their access, either intentionally or unintentionally, to harm an organization’s mission, resources, information, systems, or other assets.

Vanta's latest product capabilities accelerate compliance for startups

Whether it's expanding to new regions or selling to larger customers with higher expectations, establishing an effective security and compliance program is a necessary step for growing startups. For many, the first step to unlocking growth is getting a SOC 2 report, which can be a complicated process. Many startups struggle to achieve compliance due to unclear requirements and an overwhelming amount of tools to choose from—making it hard to know which solution can get them compliant, fast. ‍