Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Rising Tide: Understanding the Surge in Cyber Attacks in India

Over the past year, India witnessed a steep rise in cyberattacks. While news focused on big-ticket data breaches and mainstream ransomware attacks, it ignored how the overall threat landscape has become more sophisticated and ingrained. India detected over 369 million malware events between October 2023 and September 2024, at a rate of 702 potential threats per minute on average.

The Power of Automated Risk Resolution: Simplifying Security for Your Team

In today’s cybersecurity landscape, security teams face a daunting challenge: managing an ever-growing volume of risks with limited time and resources. Traditional manual risk resolution methods are no longer sufficient. They slow down response times, increase the risk of human error, and strain already stretched teams—ultimately compromising the organization’s security posture. That’s where automated risk resolution comes in.

How to Easily Backup and Restore SUSE Virtualization VMs (Updated Tutorial)

In this updated tutorial, Martin Phan, Field CTO at CloudCasa, walks you through how to easily back up and restore virtual machines in SUSE Virtualization (formerly Harvester). You'll see how to register your SUSE cluster with CloudCasa, protect containerized VMs, and perform a full VM restore — including the ability to restore to a different namespace with options to power off the VM and apply additional restore transformations.

How to Backup Kubernetes Clusters with Terraform and CloudCasa | Step-by-Step Demo

In this demo, Martin Phan, Field CTO at CloudCasa, shows you how to automate the deployment of CloudCasa resources using our official Terraform provider. Learn how to register Kubernetes clusters, set up backup jobs and policies, and define object storage destinations — all through infrastructure as code. What you'll learn.

Inside RansomHub: Tactics, Targets, and What It Means for You

Ransomware attacks are undeniably on the rise—but just how significant is the increase? According to Bitsight CTI researchers, ransomware attacks (as measured by unique victims listed on leak sites) rose by almost 25% in 2024, and the number of ransomware group leak sites rose by 53%. Ransomware is becoming the go-to tactic for financially driven threat actors seeking quick and substantial payouts.

Threat Modeling Checklist for Mobile App Development

As mobile apps become increasingly central to business operations and user engagement, securing them from design to deployment has never been more critical. Threat modeling offers an essential first step in identifying and mitigating potential security risks early in the development process. It helps you think like an attacker, spotting weaknesses before they can be exploited.

The Worsening Landscape of Educational Cybersecurity

Last year, KnowBe4's report "Exponential Growth in Cyber Attacks Against Higher Education Institutions" illustrated the growing cyber threats facing universities and colleges. The report highlighted the perfect storm of factors making educational institutions prime targets: vast data repositories, open networks, limited security resources, and decentralized governance structures.

New Unrestricted AI Tool Can Assist in Cybercrime

Researchers at Certo warn that a new AI chatbot called “Veniceai” can allow cybercriminals to easily generate phishing messages or malware code. The tool, which only costs $18 per month, is growing in popularity on criminal forums. “One of the starkest contrasts between Veniceai and more mainstream AI systems like ChatGPT is how each responds to harmful or malicious requests,” Certo says.