Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

A Guide to New Zealand's Cybersecurity Standards

In an age of increasingly complex cyber threats, New Zealand has implemented robust cybersecurity standards to secure the online environment for individuals, businesses, and government entities. New Zealand's cybersecurity approach is unique and effective, from the overarching strategies laid out by national cybersecurity policies to specific regulatory requirements that impact sectors like healthcare and finance.

Protect Your Digital World with CyberArk and Proofpoint Browser Security!

In this video, we dive into the powerful combination of CyberArk and Proofpoint Browser Security, two leading solutions in the realm of cybersecurity. Learn how these tools can fortify your defenses against cyber threats and safeguard your sensitive information. Topics Covered: Who Should Watch: Stay Connected: Don't forget to subscribe to our channel for more insights into the latest cybersecurity trends and solutions. Hit the bell icon to get notified whenever we upload a new video!

The Global Reach of Cyber Threats: Why Security Awareness Training is More Important Than Ever

Based on news cycles within cybersecurity, it's easy to fall into the trap of thinking that threats only come from certain parts of the world or that they only target specific industries. However, the reality is that cyber attacks know no borders, and no organisation is immune. The recent report by Cisco Talos showcasing the discovery of a six-year campaign by Pakistani hackers targeting Indian government and defence organisations is a stark reminder of this fact.

Understanding the Risks of Remote Monitoring and Management Tools

On February 19, 2024, ConnectWise published a security bulletin detailing two critical vulnerabilities within their on-premises ScreenConnect software, stating that the vulnerabilities have the potential to result in remote code execution (RCE). ScreenConnect is a widely utilized Remote Monitoring and Management (RMM) tool that has been leveraged by threat actors in the past, often in connection with ransomware attacks.

Here's Why Regulatory Compliance is Important

You don’t have to jump through endless hoops to achieve regulatory compliance. By finding an easy way to comply with the right laws, regulations, and industry standards, regulatory compliance can offer several benefits for companies. Specific compliance requirements vary by industry and country. But in general, implementing regulatory compliance is a mandatory requirement for every sector and every company in countries with a robust business and economic landscape.

Phishing Campaign Targets Job Seekers With WARMCOOKIE Backdoor

A phishing campaign is impersonating recruiting firms to target job seekers with a new strain of malware, according to researchers at Elastic Security. “Since late April 2024, our team has observed new phishing campaigns leveraging lures tied to recruiting firms,” the researchers write.

Securing the Cloud: A Comprehensive Guide to Identity and Access Management

In the not-so-distant past, managing user identities and access controls was a relatively straightforward process. Organizations operated within the confines of their on-premises networks where users logged onto a single system to access the resources they needed. This well-defined perimeter enabled IT departments to maintain tight control over who accessed what and from where. However, the advent of cloud computing has disrupted this traditional paradigm.

Microsoft Recall: Detecting Abuse | Threat SnapShot

You've probably heard of Microsoft's new Recall feature by now. It's a info stealer's dream come true. There has been a lot of information release about how this new feature is a security nightmare and how it works. But today we are going to dig in and discover how to actually detect abuse of this new feature.