• A Simple Guide to the Updated NIST 2.0 Cybersecurity Framework

    A Simple Guide to the Updated NIST 2.0 Cybersecurity Framework

    Staying ahead of threats is a challenge for organizations of all sizes. Reported global security incidents grew between February and March of 2024. They increased by 69.8%. It’s important to use a structured approach to cybersecurity. This helps to protect your organization. The National Institute of Standards and Technology (NIST) created a Cybersecurity Framework (CSF).…

    Read More

  • 6 Types of Applications Security Testing You Must Know About

    6 Types of Applications Security Testing You Must Know About

    Application security testing is a critical component of modern software development, ensuring that applications are robust and resilient against malicious attacks. As cyber threats continue to evolve in complexity and frequency, the need to integrate comprehensive security measures throughout the SDLC has never been more essential. Traditional pentesting provides a crucial snapshot of an

    Read More

  • Meta Removes 63,000 Instagram Accounts Linked to Nigerian Sextortion Scams

    Meta Removes 63,000 Instagram Accounts Linked to Nigerian Sextortion Scams

    Meta Platforms on Wednesday said it took steps to remove around 63,000 Instagram accounts in Nigeria that were found to target people with financial sextortion scams. “These included a smaller coordinated network of around 2,500 accounts that we were able to link to a group of around 20 individuals,” the company said. “They targeted primarily…

    Read More

  • Webinar: Securing the Modern Workspace: What Enterprises MUST Know about Enterprise Browser Security

    Webinar: Securing the Modern Workspace: What Enterprises MUST Know about Enterprise Browser Security

    The browser is the nerve center of the modern workspace. Ironically, however, the browser is also one of the least protected threat surfaces of the modern enterprise. Traditional security tools provide little protection against browser-based threats, leaving organizations exposed. Modern cybersecurity requires a new approach based on the protection of the browser itself, which offers…

    Read More

  • Researchers Reveal ConfusedFunction Vulnerability in Google Cloud Platform

    Researchers Reveal ConfusedFunction Vulnerability in Google Cloud Platform

    Cybersecurity researchers have disclosed a privilege escalation vulnerability impacting Google Cloud Platform’s Cloud Functions service that an attacker could exploit to access other services and sensitive data in an unauthorized manner. Tenable has given the vulnerability the name ConfusedFunction. “An attacker could escalate their privileges to the Default Cloud Build Service Account and

    Read More

  • How a Trust Center Solves Your Security Questionnaire Problem

    How a Trust Center Solves Your Security Questionnaire Problem

    Security questionnaires aren’t just an inconvenience — they’re a recurring problem for security and sales teams. They bleed time from organizations, filling the schedules of professionals with monotonous, automatable work. But what if there were a way to reduce or even altogether eliminate security questionnaires? The root problem isn’t a lack of great questionnaire products…

    Read More

  • Telegram App Flaw Exploited to Spread Malware Hidden in Videos

    Telegram App Flaw Exploited to Spread Malware Hidden in Videos

    A zero-day security flaw in Telegram’s mobile app for Android called EvilVideo made it possible for attackers to malicious files disguised as harmless-looking videos. The exploit appeared for sale for an unknown price in an underground forum on June 6, 2024, ESET said. Following responsible disclosure on June 26, the issue was addressed by Telegram…

    Read More

  • How to Reduce SaaS Spend and Risk Without Impacting Productivity

    How to Reduce SaaS Spend and Risk Without Impacting Productivity

    There is one simple driver behind the modern explosion in SaaS adoption: productivity. We have reached an era where purpose-built tools exist for almost every aspect of modern business and it’s incredibly easy (and tempting) for your workforce to adopt these tools without going through the formal IT approval and procurement process. But this trend…

    Read More

  • Patchwork Hackers Target Bhutan with Advanced Brute Ratel C4 Tool

    Patchwork Hackers Target Bhutan with Advanced Brute Ratel C4 Tool

    The threat actor known as Patchwork has been linked to a cyber attack targeting entities with ties to Bhutan to deliver the Brute Ratel C4 framework and an updated version of a backdoor called PGoShell. The development marks the first time the adversary has been observed using the red teaming software, the Knownsec 404 Team…

    Read More

  • CrowdStrike Explains Friday Incident Crashing Millions of Windows Devices

    CrowdStrike Explains Friday Incident Crashing Millions of Windows Devices

    Cybersecurity firm CrowdStrike on Wednesday blamed an issue in its validation system for causing millions of Windows devices to crash as part of a widespread outage late last week. “On Friday, July 19, 2024 at 04:09 UTC, as part of regular operations, CrowdStrike released a content configuration update for the Windows sensor to gather telemetry…

    Read More