Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Breach Impacts American and Southwest Airlines: US Pilot Credentials Compromised

In a chilling reminder of the relentless threat posed by hackers and cybercriminals, not even the aviation industry is safe from their clutches. Recent reports have shed light on a grave security breach, as unauthorized individuals gained access to vital pilot credentials within two prominent American aviation companies. The far-reaching impact of this breach serves as a stark warning to businesses across all domains: no data is safe from the clutches of malicious actors.

Defend Your Software Supply Chain by Curating Open-Source Packages Entering Your Organization | Announcing JFrog Curation

Modern organizations are constantly striving to gain a competitive advantage by delivering software solutions at a remarkable pace. To achieve this, they heavily rely on open-source software (OSS) libraries and packages, which constitute a significant portion (80-90%) of their software solution. However, while open-source software offers numerous benefits, it also presents potential security challenges.

Under the Wing: The Risks of Microsoft Security

Cyber risk starts with your choice of security provider. Your security investment is one of the most CRITICAL business decisions you can make. You may have heard that Microsoft offers endpoint security as a built-in feature of their products. But if your security is “free” - you’re getting what you pay for. In our latest episode of Under the Wing, join Mark as he dives deeper into some of the risks of using Microsoft security products and 5 reasons why CrowdStrike customers never have to compromise on security.

What Is Business Email Compromise?

Business Email Compromise (BEC) is a targeted cyberattack in which a cybercriminal poses as a trusted figure, such as the CEO of a company, and sends out an email to specific individuals requesting sensitive information or money. BEC attacks involve research and preparation in order for the cybercriminal to develop a convincing impersonation. Continue reading to learn more about business email compromise and what organizations should do to prevent this type of attack.

Challenges when implementing an AWS multi-account strategy

Implementing an AWS multi-account strategy is a popular approach that helps organizations to manage their cloud resources efficiently. In my previous post, I discussed our reasons for implementing an AWS multi-account strategy, our journey, and some of the benefits we gained as an organization. However, implementing this strategy can come with its fair share of challenges.

How to Deal with Hundreds of Fixes? Choosing the Right Vulnerability Management Solution

Relying solely on the Common Vulnerability Scoring System (CVSS) is insufficient when it comes to effective vulnerability management. While the CVSS score provides a quantitative measure of a vulnerability’s severity, it fails to capture the contextual nuances that can significantly impact the actual risk to an organization. In this article, we will discuss how best to choose a vulnerability management solution.

Netskope and Wipro Partner to Combine Global Networking and Security Services to Full-stack SASE Platform

As organizations continue to re-engineer their data infrastructures to enable efficient, secure productivity for workforces wherever they may be, Netskope is deepening its partnerships with global system integrators who have the experience and worldwide presence to guide those strategic digital transformation projects.

ARx Patient Solutions Gets Hacked and Waits Months to Inform 40k Victims

ARx is a healthcare provider based in Kansas. The company specializes in drug delivery systems and works with many different healthcare facilities. During regular work, the company handles patient information and is in charge of healthcare details as well as personal information. According to ARx, it was hacked in 2022, and nearly 40,000 people could be exposed because of the attack.