Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

LockBit ransomware gang says sorry, gives free decryptor to SickKids hospital

Do ransomware gangs actually have a heart? Perhaps... Just days before Christmas, on the night of Sunday 18 December 2022, Canada's Hospital for Sick Children (better known as SickKids) was hit by a ransomware attack. The Toronto-based teaching and research hospital reported that the attack had impacted its internal systems, phone lines, and website.

Attack Surface Management vs. Vulnerability Management: What's the Difference?

Attack surface management (ASM) and vulnerability management (VM) are often confused, but they’re not the same. The primary difference between the two is scope: Attack surface management and external attack surface management (EASM) assume that a company has many unknown assets and therefore begin with discovery. Vulnerability management, on the other hand, operates on the list of known assets.

2022 Year in Review: Ransomware

With 2022 having just ended, let's take a look back at the year in ransomware. With the average cost of an attack ranging from $570,00 to $812,360 for just the ransom, according to Cloudally, it should be no surprise that it continued to be one of the most prominent attacks utilized by malicious groups. We'll be doing a quick overview of a few of the most active groups within the space over the past year, and any developments that those groups have made in the past 12 months.

Case study: How Mulligan Funding built a SOC 2-compliant fintech SaaS platform with Calico Cloud

The rise of fintech has pushed traditional financial institutions to provide online-based services and launch fintech applications. But these services must be secure and meet certain regulatory requirements, such as the Payment Card Industry Data Security Standard (PCI DSS), the General Data Protection Regulation (GDPR), or SOC 2.

CircleCI Breach: How to Rotate All Stored Secrets ASAP

Yesterday, CircleCI, a Continuous Integration/Continuous Delivery (CI/CD) service, notified the world it had been breached via a critical advisory from its CTO. As a major software delivery pipeline service, CircleCI users store myriad credentials for various services in CircleCI’s “Secrets Store” infrastructure.

How Egnyte Enables Secure File Sharing and Collaboration for CROs

‍ As a contract research organization (CRO), your greatest responsibility is to be a reliable partner to the sponsor in executing a clinical trial. This can include tasks such as writing the study protocol, collecting and submitting data to the FDA, and monitoring sites throughout the study. To honor that responsibility, a CRO must have the right tools and skills to securely share trial data and collaborate with the sponsor.

Under the Wing: Detecting Fileless Attacks with Advanced Memory Scanning

In 2021, over 60% of all attacks were malware free. Because malware free or fileless attacks can be carried out entirely in memory, detection can be challenging. But with new cutting-edge Advanced Memory Scanning capabilities, organizations can quickly automate high-performance scanning to detect the most advanced attacks.

Netskope IoT Security

Netskope IoT Security uncovers managed and unmanaged connected devices on both the radio and network spectrum and generates deep device-level contextual intelligence for device classification, asset management, dynamic risk assessment, segmentation, and access control, mitigating IoT-related threats and addressing the hidden attack surface created by the connected devices.