Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

There's a New Stealer Variant in Town, and It's Using Electron to Stay Fully Undetected

Our threat research team recently uncovered new npm packages that are used to download a new info-stealer variant that uses the popular Electron framework to disguise itself as a legitimate application. In this blog post, we’ll analyze the attack flow of this new info-stealer we detected and explain how it can stay undetected by abusing trusted development tools like Electron.

ISO 27001 Compliance for SaaS | SOC2 vs ISO | Girish Redekar (CEO & Co-Founder, Sprinto)

Overview: In this podcast, Girish Redekar (CEO and Co-Founder, Sprinto), shares with Venky the most effective ways to implement the ISO 27001 framework for organizations to attain comprehensive security, rather than solely obtaining a certification. He also discusses similarities & differences between SOC2 and ISO 27001, and suggests that organizations can streamline their security program to achieve multiple certifications more efficiently.

GDPR Compliance Audit - Evaluating Your Data Protection Practices

The GDPR is a regulation established by the European Union to provide guidelines for the collection and processing of personal data within the EU. A GDPR compliance audit is an independent and systematic evaluation of an organization’s adherence to these guidelines. The goal of such an audit is to help organizations meet their obligations under the GDPR and identify areas for improvement.

The Importance of Integrating Physical and Digital Security Access in Higher Education

An integrated physical and digital security access system provides campus law enforcement and security with a more holistic view of activities on campus. When access and identity are further integrated with video surveillance, intercoms, and visitor management, security is strengthened even more. The University of Washington and Michigan State University recently announced plans to expand campus physical and digital security systems.

Staying Protected: Understanding the Vital Role of Cybersecurity on University Campuses

Cyber threats are increasingly affecting universities and colleges in the USA. Institutions have experienced a surge in cyber attacks in recent years, including data breaches, ransomware attacks, phishing scams, and malware infections. One driving factor for this increase is the valuable data higher education institutions hold, including sensitive personal information of students, faculty members, and staff, as well as important research data and intellectual property.

The Impending EOL of CentOS 7: What You Need to Know and How to Prepare

CentOS 7 has been a popular choice for many businesses and developers due to its stability, robustness, and compatibility with enterprise-level applications. According to W3Techs, CentOS is used by 2.8% of all the websites whose operating system is known. However, as announced on the official CentOS blog, the end of life (EOL) for CentOS 7 is fast approaching. This means that after June 30, 2024, CentOS 7 will no longer receive official support, updates, or security patches.

Secure Success with Robust Commercial Security

In the contemporary world, businesses must prioritize security to protect their assets, data, and reputation. Robust commercial security encompasses a range of measures from physical security to cybersecurity, ensuring that all facets of a business are safeguarded. In this article, we will explore why commercial security is essential and how to implement the right measures to ensure ongoing success.

Cloudflare Bot Management now on IBM Cloud Internet Services to address growing threat landscape for enterprises

IBM Cloud Internet Services (CIS) expands offering with Cloudflare Bot Management now available to protect enterprises from increased security threats across the business landscape.