Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Blogs

New Features: Third Party Cyber Risk Quantification & Data Transparency

Third party cyber risk can be a lot like the wild wild west - it’s hard to predict where your next loss will come from. We know that third-party cyber events can lead to millions of dollars of loss revenue, remediation costs, regulatory fines & more. That’s why Kovrr has made significant updates to their platform to help put a financial quantification on risk derived from your organization’s third parties.

Fostering an effective and secure remote-work model

An IDSA study found that 79% of enterprises have suffered an identity-related breach. At ManageEngine, we understand how important identities are to the overall security posture of an organization. That’s why this Identity Security Week, we’re offering a series of blogs to spread awareness about the importance of identity security and what simple measures can help improve the security of your organization. Let’s kick off the series with a trending topic—remote work.

Twitter's New Verified Badge Causes Security Issues

Over the past weeks, Elon Musk’s purchase of Twitter has drawn the attention of people worldwide, even those who are not using the platform. One of many ideas Musk had while purchasing Twitter was to allow users to pay $8 per month and receive the blue check mark. Until this decision, only verified celebrities, companies, and journalists by Twitter, received the mark and it helped fight against fraud and identity theft incidents.

Curbing Rampant CEO Fraud in 2022

If it seems like you’re constantly hearing about cybercrime these days, there’s a reason for that. Globally, reports of cyberattack instances increased by a staggering 125% in 2021, a trend that shows no sign of slowing. As businesses and consumers turn their attention to cybercrime and protective measures, enterprising cybercriminals continue to fine-tune their approach to exploiting vulnerabilities. In fact, cybercrime is on track to become the world’s third-largest economy.

Fangxiao: A Phishing Threat Actor

Do you know what “fangxiao” means in simplified Chinese? Before you Google it, let me tell you that it stands for “imitate” and this is exactly what Fangxiao phishing campaign actors try to do – imitate and exploit the reputation of international, trusted brands by promising financial or physical incentives to trick victims into further spreading the campaign through WhatsApp.

EV Code Signing vs. Regular Code Signing: Difference to know

Digital security certificates such as code signing are a key ally of developers. They act as proof that your executables or applications are secure and haven’t been modified after signing. It makes your users feel secure and comfortable when installing and using your digital products. Obtained from a reputed Certificate Authority like Sectigo and Comodo, these certificates come in two variants: EV code signing certificate and regular code signing certificate.

7 Steps to Identifying and Fighting Cyber Crime for your Business

Cybersecurity is at the forefront as technology sees increasing adoption across multiple industry verticals. Organizations must prevent and fight cyber crime, but it can take over 200 days to detect a breach for many. This time frame increases the possible consequences of the breach and gives cybercriminals an opportunity to move laterally to other systems and exfiltrate the information they need. Once stolen, they may sell it to other cybercriminals who can use it for more nefarious means.

Mobile device DNA: what is and why should your MFA solution have it?

Multi-factor authentication adoption is booming. Regulatory pressures from different global initiatives, combined with companies making it a prerequisite to use their services and the rise in implementing the zero-trust model, have increased spending on this solution. The MFA market is estimated to be worth $12.9 billion and is expected to reach $26.7 billion by 2027, with an annual growth rate of 15.6% from 2022 to 2027.

Embedded Testing Tools: A Comprehensive Guide

Due to increasing connectivity and dependencies, modern embedded applications in many industries including automotive, aviation, and even automated cow brushes (no joke) are constantly growing more complex. This complexity comes with implications for embedded testing tools and requires plenty of manual effort, depending on the toolchain. From an operational perspective, many embedded industries are tightly staffed and work in long cycles with strict deadlines.

Stories from the SOC: Fortinet authentication bypass observed in the wild

Fortinet’s newest vulnerability, CVE-2022-40684, allowing for authentication bypass to manipulate admin SSH keys, unauthorized downloading of configuration files, and creating of super admin accounts, has put a big target on the backs of unpatched and exposed Fortinet devices.