Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

December 2024

December Release Rollup: Audio Input in Egnyte Copilot, Procore Integration - Photos and Metadata Sync, and More

We’re excited to share new updates and enhancements for December, including: For more information on these updates and others, please read the complete list below and follow the links for more detailed articles.

A Simple Guide to Building a Discord Bot! (Part 3)

This is the third video of our series 'How to Build a Discord Bot'. In this video, we will be focussing on data storage and setting up a database to store our Wordle results in. Stay tuned for the next video where we will be deploying the bot, which will be able to run 24/7! Each video will be published one week from the previous.

What Is Digital Forensics? A Key to Solving Cybercrimes

Digital forensics, which is sometimes called the "science of the digital age," is very important for finding digital proof and solving cybercrimes. Because of how connected everything is these days and how almost everything leaves a digital trail, digital forensics gives us the methods and tools to find, collect, study, and keep data for future investigations.

Importance of Password Encryption for Data Protection

In this digital age, where cyber threats are always evolving, keeping private data safe has become important for both people and businesses. Encrypting passwords is an important part of data security because it keeps user information hidden from attackers who shouldn't have access to them. Advanced algorithms are used to encrypt passwords into unreadable form. This makes encryption a strong defense against breaches and identity theft.

Security Bulletin: Critical Remote Code Execution Vulnerability in Apache Struts [CVE-2024-53677]

A newly discovered critical vulnerability, CVE-2024-53677, in Apache Struts enables remote code execution (RCE) and is actively exploited in the wild using a publicly available Proof-of-Concept (PoC). Apache Struts is an open-source framework for building Java-based web applications. It helps developers create scalable software solutions, that powers everything from e-commerce websites to financial systems and government platforms.

What You Need to Know About 2025 Data Privacy Regulations in the U.S.

In an era where data breaches make headlines almost weekly and cybercrime costs businesses billions annually, states across the U.S. are taking decisive action to protect their residents’ sensitive information. From California’s groundbreaking privacy laws to New York’s rigorous cybersecurity requirements for financial institutions, state-level regulations are rapidly evolving to address the complex challenges of digital data protection.

A White Hat's 2024 Reflections: Cybersecurity Insights and Lessons

As 2024 comes to a close, today, I’m reflecting on some of the key events and trends that shaped my offensive security research this year. From publishing my first book to writing regular blogs on some of cybersecurity’s hottest topics, each piece has contributed to a clearer understanding of the evolving digital landscape.

The Future of AI Regulation: Balancing Innovation and Safety in Silicon Valley

California Governor Gavin Newsom’s recent veto of SB 1047, a proposed AI safety bill, has sparked a hot debate on the balance between innovation and regulation in the artificial intelligence (AI) space. California has over a dozen AI related bills that have been signed although this bill sought to establish rigorous safety testing requirements for large-scale AI models and introduce an emergency "kill switch" for situations where systems might become dangerous.

What's Next for Cybersecurity in 2025 and Beyond? Fortra Experts Weigh In

We are fast approaching the end of (another) turbulent year for cybersecurity. Looking back, it's hard to believe that so much can happen in such a short time. As we finish up our work for the year, head home to our families, and prepare to close the book on 2024, it's worth considering what's next. And who better than Fortra's experts to offer insights into the year to come? Keep reading for expert predictions of cybersecurity in 2025.

Understanding Data Leaks: Causes, Consequences, and Prevention Strategies

Imagine a seemingly minor misconfiguration in your cloud storage or an employee accidentally emailing a sensitive file to the wrong person. These incidents might seem trivial, but they can quickly snowball into a massive data breach, causing financial consequences. This scenario is a stark reminder of the importance of understanding and preventing data leaks. Data leaks are a threat to organizations, and developers can play a crucial role in preventing them.