Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

The Growing Importance of CAASM in Company Cybersecurity Strategy

The recent years' events, including the proliferation of ransomware, the pandemic, and political tensions, have fast-tracked the development of both offensive and defensive tools in the cyber domain. Cybersecurity concepts that were nascent a few years ago are now being refined, demonstrating the practical benefits of modern digital risk management strategies.

From .com to .beauty: The evolving threat landscape of unwanted email

You're browsing your inbox and spot an email that looks like it's from a brand you trust. Yet, something feels off. This might be a phishing attempt, a common tactic where cybercriminals impersonate reputable entities — we've written about the top 50 most impersonated brands used in phishing attacks. One factor that can be used to help evaluate the email's legitimacy is its Top-Level Domain (TLD) — the part of the email address that comes after the dot.

Don't Forget Mobile Security: How Mobile Devices Serve as Keys to the Cloud

In February 2024, Lookout discovered an advanced phishing kit targeting the Federal Communications Commission (FCC), along with several cryptocurrency platforms. While most people think of email as the realm of phishing attacks, this threat actor — known as CryptoChameleon — used the phishing kit to build a carbon copies of single sign-on (SSO) pages, then used a combination of email, SMS, and voice phishing to target mobile device users.

Spoutible Enhances Platform Security through Partnership with Wallarm

Spoutible, the rapidly growing social media platform known for its commitment to fostering a safe, inclusive, and respectful online community, has taken a significant step forward in its mission to ensure user safety, security and data integrity. Recognizing the critical importance of robust API security in today’s digital age, Spoutible is excited to announce a strategic partnership with Wallarm, a leader in API and Application security.

What is DSPM and why is it an essential component in cloud-native security solutions?

In the rapidly advancing realm of cloud-native security, Data Security Posture Management (DSPM) emerges as a critical framework, ensuring organizations maintain robust control over their data assets. As cloud environments evolve, understanding and implementing DSPM becomes vital for better securing data defenses. In this blog post, we'll delve into the basics of DSPM, its significance in cloud-native security and how Panoptica approaches DSPM within its CNAPP solution.

Hunt for cloud session anomalies with Cloud SIEM

In today’s cloud-native world, systems are usually accessed by users from multiple devices and in various geographic locations. Anyone who has tried to operationalize an impossible travel type alert for cloud resources will understand the myriad nuances and gotchas involved in such an endeavor. A user may be accessing a cloud resource from a mobile device that is tied to a carrier network well away from their normal geographic location.

How Safe Are Apps on The App Store?

The wonderful world of apps can make our lives, work, and studies significantly easier. Our phones, tablets, or computers have many apps, ranging from photography, self-help, fitness, social media, and video games. However, some mobile apps are more safe than others. Although the app store rigorously tests its apps to ensure they function correctly and are free from harmful software, some third-party apps can still sneak onto the platform that can steal user data or harm their devices.

Decoding the Cybersecurity Implications of AI's Rapid Advancement

The genius at the heart of AI—its ability to sift through mountains of data, actually spot a needle in a haystack, and act on threats before they blossom into full-scale emergencies—it’s undeniable. However, here’s the rub—every part of that impressive arsenal? It’s also up for grabs by the other side, and can (and will) arm them to launch attacks of unprecedented sophistication and elusiveness, the likes of which we’ve thankfully never seen up to now.

Beyond the Buzz: Understanding Zero-Trust AI Architectures

In today's digital landscape, where cyber threats are ever-evolving and data breaches can have devastating consequences, zero-trust security has emerged as a robust approach to protect organizations and their critical systems. At its core, zero-trust challenges the traditional notion of inherent trust within network boundaries, advocating for a holistic security posture that treats every entity as a potential threat until proven trustworthy.