Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What You Need to Know about the Hilton Hotels Data Breach

Hilton Hotels was formally opened in 1925 in Dallas, Texas. It is a hospitality company with at least 7,629 properties across 126 countries and territories, including the United States. The business manages, owns, or franchises about 23 brands, including Hilton Garden Inn, Waldorf Astoria, Hilton Hotels and Resorts, Homewood Suites, and Conrad Hotels. Hilton Hotels has over 173 million Hilton Honors members.

A CISO's Guide: Avoiding the Common Pitfalls of Zero Trust Deployments

The world has evolved and the on-going momentum of Cloud and Work-From-Anywhere (WFA) has become unstoppable. CISOs have realized their traditional security architectures, specifically VPNs, are no longer adequate to ensure only authorized users have access to critical resources. This has made the role of CISO ever more important because we now have applications everywhere and people everywhere, leading to increased cyber threats everywhere.

Updates to the CRQ Platform: ISO 27001 Mapping and Model Calibration

‍ ‍ ‍One of the most simultaneously exciting and challenging aspects of working in the cybersecurity industry is that the risk landscape and management practices never stop evolving. Additional data is continuously being gathered, and new frameworks are constantly developed to help organizations better assess, measure, and secure themselves against threat actors poised to exploit system weaknesses.

Shadow APIs vs Zombie APIs - All You Need to Know

In the age of digital-first businesses, every other software solution either uses an API (Application Programming Interface) or makes one. They enable various applications and services to work together, enabling businesses to improve features, streamline user experience, and provide new exciting offerings. Unfortunately, the more APIs we collect and interact with, the more security challenges increase.

8 Daily Practices to Avoid Cybersecurity Burnout

Burnout happens when job demands such as workload, time pressure, and difficult clients are high, as well as when job resources, including quality leadership, autonomy and decision authority, recognition, and strong relationships, are lacking. The field of cybersecurity is particularly difficult, but that doesn't mean burnout is inevitable, and it doesn't mean you can't recover after experiencing burnout.

Re-Extortion: How Ransomware Gangs Re-Victimize Victims

Ransomware has evolved significantly since its inception. Initially, these attacks were relatively simple: malware would encrypt a victim's files, and the attacker would demand a ransom for the decryption key. However, as cybersecurity measures improved, so did ransomware gangs' tactics. Modern ransomware attacks often involve sophisticated techniques such as data exfiltration, where attackers steal sensitive information before encrypting it.

Preventing SQL injection in C# with Entity Framework

SQL injection (SQLi) is one of the most severe security vulnerabilities in web applications. It occurs when an attacker is able to manipulate the SQL queries executed by an application by injecting malicious SQL code into user input fields. SQLi can lead to unauthorized access to sensitive data, data corruption, or even complete control over the database server.

Dark Angels Ransomware Group Scores Record-Breaking $75 Million Payday

In the ever-evolving world of cybercrime, ransomware attacks continue to be a lucrative business for cybercriminals. The latest development comes from the Dark Angels ransomware group, who have reportedly secured a staggering $75 million ransom payment from an undisclosed victim. This eye-watering sum shatters the previous record of $40 million paid by insurance giant CNA Financial in 2021, setting a new and alarming benchmark in the ransomware landscape.

Organizations Prepare for More Evolved AI-Based Cyber Attacks as Deepfakes Become Top Concern

New data on how the threat of AI in cyber crime is being seen as a growing risk provides insight into how organizations are shifting from reaction to prevention. According to endpoint security vendor Deep Instinct’s Voice of SecOps report, 97% of organizations are concerned they will suffer a security incident as a result of adversarial AI. The advent of new malicious LLM-based AI platforms are allowing cybercriminals to get their hands on sophisticated tech and create convincing deepfakes.

The Power of Security Orchestration and Automation

In today’s digital landscape, cyber threats are constantly evolving and becoming more sophisticated. Attackers are finding new ways to breach security defenses and exploit vulnerabilities. As technology advances, so do the tactics and techniques used by cybercriminals. Gone are the days when simple antivirus software and firewalls were enough to protect against cyber threats.