Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Salesforce breach escalates: Qantas & Vietnam Airlines data leaked on dark web

The recent developments surrounding the Salesforce data breach serve as a stark reminder of the persistent threats organizations face. What began as a concerning incident earlier this summer has now escalated dramatically, with threat actors following through on their threats and releasing a substantial trove of Qantas customer data to the public.

How cyber risk quantification transforms security decision-making

Security teams drowning in alerts, executives demanding business justification for security investments, and an attack surface that grows daily – sound familiar? While traditional vulnerability scanners excel at finding problems, they fall short when it comes to the critical question: which risks actually matter to your business? This is where cyber risk quantification and cyber risk scoring come in, transforming how organizations understand and respond to threats.

Web Application Firewalls (WAFs): A false sense of security?

Web application firewalls (WAF) is a protection mechanism to help block potential malicious requests before they can reach the application itself. Often this is implemented as a proxy, intercepting HTTP requests, analyzing them, and finally deciding on an action. While effective, over relying on it could lead to a false sense of security that allows attackers to exploit unresolved internal issues.