Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Datadog Code Security achieves 100 percent accuracy in OWASP Benchmark by using an IAST approach

As application architectures shift to the cloud and the velocity of software delivery accelerates, organizations are seeking more powerful capabilities to identify security vulnerabilities within their production applications. Traditional static application security testing (SAST) tools, by themselves, are insufficient.

North Korean Threat Actors Target Software Developers With Phony Job Interviews

Suspected North Korean threat actors are attempting to trick software developers into downloading malware during phony job interviews, according to researchers at Securonix. The threat actors contact software developers with seemingly legitimate employment opportunities before scheduling virtual job interviews.

The cyber threat landscape in Japan - risks, threats and mitigation guidance

In our recent research “Better Safe Than Sorry”, we reported how the number of exposed OT/ICS devices in Japan grew by 372% over the past six years. During this time, several notable cyber-attacks targeted businesses and government entities in Japan. The substantial increase in exposed OT/ICS combined with the recent cyber-attacks in Japan has prompted us to give a deeper look at the current threat landscape in the country.

Stories from the SOC - Combating "Security Alert" Scams

The “Security Alert” scam is a prevalent tech-support fraud that threatens both Windows and Apple users. It exploits the trust of users by masquerading as an official support site, using fake pop-up warnings to lure users into dialing scam phone numbers by conveying a sense of urgency. The ultimate goal is gaining remote access to the user’s system and pilfering personal data to extort money.

What Is the RSA Algorithm and How Does It Work?

In today’s digital landscape, cryptography plays a vital role in keeping information secure. Encryption is one of the primary techniques used in cryptography to ensure that data transmission online is secure and that sensitive information stays protected from unauthorized access. Through encryption, organizations and individuals can mitigate the risk of data breaches and ensure that their confidential information remains that way.

How to Set Up a Security Operations Centre In 5 Steps

The benefits of a security operations centre (SOC) are most obvious when you don't have one. For example, imagine it’s 3 am on a Saturday morning and a hacker breaks into your organisation's systems. There’s no one to detect the intrusion and no one to deal with it either. In fact, it’s not until a member of your sales team notices they are locked out of the network on Monday morning that anyone even knows there is something wrong. After that, things start happening very fast.