Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

Could your kids spot this mobile phish?

I realized early on that if I didn’t teach my kids how to identify and avoid likely attacks on their laptops and phones, that no one would. Nevertheless, when I see an opportunity for a “teachable security moment” I grab it, and last week this mobile phishes appeared on my phone. I captured a screen shot to share with my children and we played a little “spot the phish” game, where they would point out all the things that made this text suspicious.

Securing Google Cloud Platform with Sysdig

Together with Google Cloud, Sysdig reduces your cloud security risk. So you can confidently run your workloads on Google Cloud. Get started in minutes with Sysdig SaaS, and simplify security, compliance, and monitoring. Accelerate your growth with NO backend data management. # CSPM Sysdig is your centralized safe place to enhance cloud security posture. # Threat detection Plug in Google Cloud Audit logs And get started quickly with our out-of-the-box Falco rules.

Popular JavaScript Library ua-parser-js Compromised via Account Takeover

A few hours ago, an npm package with more than 7 million weekly downloads was compromised. It appears an ATO (account takeover) occurred in which the author’s account was hijacked either due to a password leakage or a brute force attempt (GitHub discussion).

DBatLoader: Abusing Discord to Deliver Warzone RAT

67% of the malware downloads Netskope blocks come from popular cloud applications being abused by attackers. One of the services commonly abused by threat actors is Discord, which is abused to host malware such as TroubleGrabber using public attachment URLs. In this blog post, we will analyze a recent DBatLoader (a.k.a. ModiLoader) sample that uses this technique on Discord to deliver a malware known as Warzone (a.k.a. Ave Maria), a Remote Access Trojan created in 2018.

5 Tips for the CISO Looking to Get a Handle on Cloud Security

Over the last 18 months, cloud application use has skyrocketed, with the average organisation with 500-2,000 employees now using 805 different cloud applications. This is a staggering level of new risk for CISOs to get their heads around. At the same time that cloud use has grown, so too have the efforts of malicious actors to target cloud applications which are all too often poorly secured and present a constant opportunity of unsecured data to compromise.

Internxt

Here at Internxt, we believe that what humanity can achieve is extraordinary. We want to become a force of positive change that pushes society towards a better, brighter future. To do so, we are completely reengineering the status quo of a variety of industries, through the application of innovation in a way that’s coherent.

3 Ways Egnyte Helps Life Sciences Companies Leverage the Cloud

Life sciences companies increasingly rely on cloud computing environments to accelerate research. The cloud provides cost effective compute power, more efficient data processing, access to files and applications from anywhere, and advanced analytics tools to gain insights from data and manage it. But when a majority of that research is done by external contract research organizations (CROs) or in time zones on the other side of the world, that speed advantage can grind to a halt.