Why are threat actors faking data breaches?

Earlier this year Europcar discovered a hacker selling info on its 50 million customers on the dark web. The European car rental company immediately launched an investigation, only to discover that the data being sold was completely doctored, possibly … Continue reading Why are threat actors faking data breaches?

Find out which cyber threats you should be concerned about

This article includes excerpts from various reports that offer statistics and insights into the current cyber threat landscape. Human error still perceived as the Achilles’ heel of cybersecurity Proofpoint | 2024 Voice of the CISO | May 2024 … Continue reading Find out which cyber threats you should be concerned about

Log4J shows no sign of fading, spotted in 30% of CVE exploits

Organizations continue to run insecure protocols across their wide access networks (WAN), making it easier for cybercriminals to move across networks, according to a Cato Networks survey. Enterprises are too trusting within their networks The Cato CTRL… Continue reading Log4J shows no sign of fading, spotted in 30% of CVE exploits

Fake data breaches: Countering the damage

Amid the constant drumbeat of successful cyberattacks, some fake data breaches have also cropped up to make sensational headlines. Unfortunately, even fake data breaches can have real repercussions. Earlier this year, a hacker on a criminal forum claim… Continue reading Fake data breaches: Countering the damage

Bridging the gap between cloud vs on-premise security

With the proliferation of SaaS applications, remote work and shadow IT, organizations feel obliged to embrace cloud-based cybersecurity. And rightly so, because the corporate resources, traffic, and threats are no longer confined within the office prem… Continue reading Bridging the gap between cloud vs on-premise security

The power of passive OS fingerprinting for accurate IoT device identification

The number of IoT devices in enterprise networks and across the internet is projected to reach 29 billion by the year 2030. This exponential growth has inadvertently increased the attack surface. Each interconnected device can potentially create new av… Continue reading The power of passive OS fingerprinting for accurate IoT device identification

Infosec products of the month: July 2022

Here’s a look at the most interesting products from the past month, featuring releases from: Action1, Aqua Security, Cato Networks, CertiK, CoSoSys, CyberArk, Darktrace, Deloitte, EnGenius, Flashpoint, Fusion Risk Management, G-Core Labs, Kingston Digi… Continue reading Infosec products of the month: July 2022

New infosec products of the week: July 22, 2022

Here’s a look at the most interesting products from the past week, featuring releases from Cato Networks, CoSoSys, Darktrace, EnGenius, Orca Security, Persona, and Resecurity. Resecurity Digital Identity Protection defends individuals and businesses fr… Continue reading New infosec products of the week: July 22, 2022