Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

UN Approves Controversial Cybercrime Treaty Amidst Concerns Over Tech and Privacy

A newly drafted United Nations treaty aimed at combating global cybercrime has sparked significant debate due to its potential implications for technology companies, privacy rights, and digital freedoms. The UN Convention Against Cybercrime, which advanced from committee to the General Assembly on August 8, 2024, could require nations to enforce stringent laws against unauthorized access to information systems and data interception, raising alarms among privacy advocates and cybersecurity experts.

Guide: Verifying Microsoft Verified ID with a WordPress Plugin | Digital & Decentralized Identity

Follow our step-by-step instructions to set up and verify Microsoft Verified ID using a WordPress plugin. We’ll cover everything from plugin installation to configuration, so you can confidently manage digital identities on your site.

How to connect a WebDAV server to Internxt Drive

This short tutorial shows you how to use WebDAV by connecting to a WebDAV server to upload your Internxt Drive files via the Internxt CLI, ensuring your files are securely transferred and accessible. Once you have downloaded the Internxt CLI, you can connect and interact with your Internxt cloud storage via your preferred WebDAV server, we support: CyberDuck, Transmit, Cadaver, or Finder.

Enhanced Compliance Monitoring with NIST 800-53 Integration

Illuminate 5.1.0 is now available, bringing substantial improvements to our compliance capabilities. This update represents a significant step forward, with NIST 800-53 as the cornerstone of our compliance framework. Let’s explore the key features and improvements implemented to support your organization’s security and compliance needs. Important Note: To run Illuminate 5.1.0, your environment must run Graylog 6.0 or higher.

We Made It! Nucleus Placed 267 on Inc. 5000 Fastest Growing Companies

This week, Nucleus can add another accolade to a growing list, being listed as number 267 on Inc. Magazine’s list of the 5000 fastest-growing companies in America. We are proud of the growth we’ve achieved as a company and the potential for the future at Nucleus. Looking more closely at the results, we are the fourth fastest-growing security company on the list. As many people know, the cybersecurity and technology market has been tumultuous recently.

Vulnerabilities in NodeJS C/C++ add-on extensions

One of the main goals of this research was to explore C/C++ vulnerabilities in the context of NodeJS npm packages. The focus will be on exploring and identifying classic vulnerabilities like Buffer Overflow, Denial of Service (process crash, unchecked types), and Memory Leakages in the context of NodeJS C/C++ addons and modeling relevant sources, sinks, and sanitizers using Snyk Code (see Snyk brings developer-first AppSec approach to C/C++).

PSPF 001-2024: Safeguarding GovTech from Foreign Influence

In 2024, the Australian government introduced PSPF Direction 001-2024 in recognition of the potential threats posed by Foreign Ownership, Control, or Influence (FOCI) on technology assets and GovTech (government technology operations). As part of the Protective Security Policy Framework (PSPF), PSPF 001-2024 is a crucial step in evaluating and mitigating cyber risks associated with foreign interference in the procurement and maintenance of technology assets.

Top 7 Practices to Prevent Data Leakage through ChatGPT

Generative AI (GenAI) tools like ChatGPT have already become indispensable across organizations worldwide. CEOs are particularly enthusiastic about GenAI’s ability to let employees “do more with less”. According to the McKinsey Global Survey on the State of AI in 2024, 65% of organizations already use GenAI tools extensively, and Gartner forecasts that this number will reach 80% by 2026.