Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Safe and Attack-Proof Are Encrypted Apps?

In today’s digital landscape, encrypted messaging apps are widely regarded as essential tools for secure communication. Businesses and individuals alike turn to platforms like Signal, WhatsApp, and Telegram to protect sensitive conversations from prying eyes. But how secure are these apps really? Are they truly attack-proof, or do they provide a false sense of security?

Top 7 Account Takeover Solutions

Due to compromised accounts, financial institutions lose billions annually in unauthorized transactions and account-related fraud. Airlines suffer millions in fraudulent ticket purchases, and retailers face widespread loyalty fraud and resold gift cards. Automated, bot-driven takeovers further amplify the issue, driving costly credential-stuffing attacks that inflate operational costs and burn through budgets. The list goes on, and the problem is only getting worse.

CrushFTP auth bypass vulnerability: Disclosure mess leads to attacks

Outpost24 analysts recently discovered a critical authentication bypass vulnerability in CrushFTP, identified as CVE-2025-31161. The vulnerability has a CVSSv3.1 score of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (9.8). We reached out to MITRE for a CVE on 13th March 2025 and were within an agreed 90-day non-disclosure period with CrushFTP. The plan was to give users plenty of time to patch before attackers were alerted to the vulnerability and able to exploit it.

How to Strengthen Your Network Security with LDAP Injection Defense

As organizations continue to rely on directories to store critical information such as user credentials, access permissions, and organizational data, the security of these directories becomes even more vital. LDAP (Lightweight Directory Access Protocol) is widely used for storing and managing this information. However, this reliance also makes LDAP directories a prime target for malicious attacks, with one of the most dangerous being LDAP injection attacks.

Top 5 Cyber Threats CultureAI Detected in Q1 2025

Cyber security threats continue to evolve, but one factor remains consistent: human error is still the greatest risk to modern businesses worldwide. Employees make mistakes, bypass security measures, and fall victim to sophisticated social engineering attacks, leading to devastating data breaches. Despite extensive security awareness training, the reality is that investing more time and money in training isn’t solving the problem.

Insight beyond annual risk using attack chain mapping

Thriving organizations maximally allocate resources. With seemingly infinite cybersecurity threats and finite resources, everyone needs to know the size of the threat to determine priority, and where to invest to maximize ROI. Elastic takes a quantified approach to cybersecurity risk management using FAIR to break threat scenarios into (A) likelihood and (B) losses to calculate risk per year, AKA annualized loss expectancy, or in FAIR terms, simply “risk”.

What are Zero-Day Attacks?

A Zero-Day Attack occurs when hackers exploit a previously unknown vulnerability in software or hardware before the developer has a chance to fix it. These attacks are particularly dangerous because there is no defense in place when they occur. In this video, we explain how Zero-Day attacks work and how you can protect your systems from these hidden threats.

Supply Chain Attacks: What You Should Know

Supply-chain attacks may not grab the headlines in the same way as ransomware or data breaches, but these horrific, sneaky cyberattacks are just as dangerous for your business. Here are five things you need to know about supply chain attacks, including what they are, why they happen, and how to prevent them.

Github Actions Supply Chain Attacks

This week, we discuss a recent cascading supply chain attack involving multiple Github actions workflows that nearly succeeded in compromising a popular Coinbase application. Before that, we discuss a novel way to download malware onto an endpoint by abusing a web browser's caching feature. Additionally, we cover an FBI alert on file converter malware scams.

How to Safeguard Critical Assets from the Growing Threat of Supply Chain Cyberattacks

Organizations must develop robust programs to manage supply chain risks, both known and unknown, while prioritizing their most critical assets. Often referred to as the "crown jewels", these assets are the most valuable and vital to business success. Supply chain attacks exploit vulnerabilities in the network of suppliers, distributors, and other third-party partners to gain unauthorized access to sensitive data and systems.