Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Can My iPhone Get a Virus?

Yes, your iPhone can get viruses. However, it is uncommon for iPhones to get viruses due to the nature of Apple’s iPhone Operating System (iOS). Because iPhone users are only able to download apps from the App Store, this makes it much harder for hackers to infect their devices. Having a jailbroken iPhone would make you more susceptible to getting infected with viruses because you could download unauthorized apps outside of the App Store.

Massive Supply-Chain Ransomware Attack Cripples Thousands of Car Dealerships

A widespread ransomware attack has brought thousands of car dealerships across the United States to a halt. The incident, attributed to the BlackSuit ransomware gang, targeted CDK Global, a software provider essential to the operations of numerous car dealerships. This breach underscores the critical need for robust cybersecurity measures such as stolen credentials detection, darknet monitoring services, and digital footprint analysis.

Security Update: Critical CUPS Vulnerability

A critical chained vulnerability (CVE-2024-47076, CVE-2024-47175, CVE-2024-47176, and CVE-2024-47177) has been detected within the open-source printing system CUPS (present in most Linux distributions). Attackers can achieve remote code execution, potentially leading to complete control of the vulnerable system. Detectify customers can assess whether their systems are running affected versions of CUPS.

Alerts on Policy Breaches Now Available via API

All Surface Monitoring users can configure Attack Surface Policies directly from the new Domains page, enabling various combinations of characteristics that were previously unavailable. Users are now alerted when policy breaches occur directly through their integrated tools, such as Slack and Jira.

Cato Networks recognized as a Leader in the 2024 Gartner Magic Quadrant for Single-Vendor SASE Report

SASE is all about strategically solving business problems. The systematic removal of technology barriers standing in the way of business outcomes. It is a brand new “how” (platform) for a well-known “what” (features). When we started Cato in 2015, we were immersed in skepticism. Can you actually build a cloud network that will replace MPLS circuits with decades of proven reliability?

Top 4 Most Common Cyberthreats to Organizations

In today's digital age, where cyberattacks are multiplying rapidly, understanding the threat landscape is essential for the survival of organizations. It is clear that cybercriminals are not resting on their laurels and are constantly developing new strategies. This forces businesses to stay ahead of the curve to protect their digital assets. Companies need to be aware of the most common cybersecurity threats and the appropriate protection measures to ensure the security of their sensitive information.
Featured Post

Why regulation is the cornerstone of AI development

By now, we're very familiar with the game-changing potential of AI. The rapid rise of ChatGPT has shown us just how quickly the technology has gone from concept to the palm of our hands. AI has the ability to dramatically accelerate workflows, and subsequently free up businesses to focus on strengthening their security and build customer trust. Why then is the UK's security industry so short on confidence when it comes to using it? One reason: a lack of regulation.

CISO Explains Switch from Microsoft to CrowdStrike for Cybersecurity

The CISO of a major insurance company recently switched from Microsoft to CrowdStrike for endpoint and identity security following a ransomware incident that Microsoft Defender failed to block. The following Q&A explains what happened, the fallout with Microsoft and how CrowdStrike delivered the protection, consolidation and support the CISO needed. Describe your security posture before the incident. I joined the company as CISO a few years ago.

Hacked Customer Support Portal Being Used to Send Phishing Emails

A hacked customer support portal belonging to router manufacturer Mercku is being used to respond to customer queries with phishing emails, BleepingComputer reports. If a customer files a support ticket through the company’s Zendesk portal, they’ll receive an automated response that attempts to trick them into granting access to their Metamask cryptocurrency account.