Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Secure Employee Offboarding with Workday Integration

The offboarding phase is a critical time to manage risk and protect sensitive data. With the new Workday integration, departing users are automatically added to a designated Active Directory group. Falcon Identity Protection and Falcon Data Protection then apply real-time controls to block unauthorized access and prevent data exfiltration—watch the demo to see it in action!

Why Keeping Old Software Is a Security Risk #cybersecurity #appsec

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Thousands of WordPress Sites at Risk After Gravity Forms Breach

A critical vulnerability in the popular Gravity Forms WordPress plugin has led to widespread malware injections across thousands of sites. The flaw is being actively exploited by threat actors, some of whom are inserting backdoors and malicious JavaScript into WordPress sites to carry out data theft, SEO poisoning, and client-side attacks.

Thousands of Spoofed News Sites Are Pushing Push Investment Fraud Scams

Scammers are using over 17,000 phony news sites to push investment fraud, according to a new report from CTM360. These websites, which the researchers call “Baiting News Sites (BNS),” spread via legitimate ad platforms such as Google or Meta. The sites impersonate well-known news providers, including CNN, the BBC, CNBC, News24, and ABC News. If a user clicks on one of these sites, they’ll be shown a fake news article about a well-known figure promoting a phony investment opportunity.

FTC Advisory: How to Protect Yourself Against Job Scams

The US Federal Trade Commission (FTC) has issued an advisory warning of job scams that impersonate well-known companies with tempting employment opportunities. The scammers are trying to steal users’ personal and financial information in order to steal their money or launch further attacks.

How CleanINTERNET DNS Stops DNS Tunneling Before It Starts

Modern cyber threats are increasingly stealthy. A favorite tactic? DNS tunneling—a method used to bypass traditional network security controls by hiding malicious traffic inside DNS queries and responses. This can be done by embedding or encoding command and control instructions or data within subdomains or DNS record fields like TXT, CNAME or other rarely used record types.

8 Features To Look For in a Password Manager

A password manager protects your online accounts by storing all your passwords in one place, making it easier to use strong, unique passwords for every account without having to remember them all. Many password managers also support passkeys, which make logging in even safer and easier as an alternative to traditional passwords.

Why are non-human identities suddenly such a big deal?

If you are like me, a couple of years ago it was like I woke up to a new concept in the world of IT: the non-human identity. But, wait…this sounds very familiar. Haven’t we had service accounts and machines identities for performing automated tasks for many years now? In fact, I was on a development team that produced what is now known as RPA tools that helped automate repetitive IT tasks; an area highly used by many enterprises.