Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Double Dipping Cheat Developer Gets Caught Red-Handed

Following our post “A Brief History of Game Cheating,” it’s safe to say that cheats, no matter how lucrative or premium they might look, always carry a degree of danger. Today’s story revolves around the developer of the popular EvolvedAim, a cheat for Escape From Tarkov. He sold his tool with an information stealer bundled with it, double-dipping and causing damage to his clients and to the game itself.

A Brief History of Game Cheating

Over the short span of video game cheating, both cheaters and game developers have evolved in many ways; this includes everything from modification of important game variables (like health) by using tools like Cheat Engine. In addition, game botting impacts both game and real-life economies. However, using modern-day anti-cheat methods is also not without danger, as modern protection tools run on the kernel level and can be abused for malicious impact on the system.

5 Strategies for Setting the Right Cybersecurity KPIs

Cybersecurity key performance indicators (KPIs) measure the efficacy of an organization’s cybersecurity program. In a rapidly changing threat landscape characterized by new identities, environments and attack methods, many potential KPIs exist to track. Measuring too many things can be distracting or misleading, while not measuring enough can create gaps in understanding and protection.

Is It Safe to Password-Protect a PDF File?

No, it’s not safe to password-protect PDF files because your files are not guaranteed to be protected from cybercriminals intercepting and gaining unauthorized access to your information. Often, people password-protect a PDF file to protect sensitive information and set permissions on how the PDF file can be used. If you password-protect a PDF file, you can choose whether you want a recipient of the file to view or edit the file.

My Apple ID Was Hacked. What Should I Do?

If your Apple ID was hacked, some immediate steps you can take include resetting your password and setting up Two-Factor Authentication (2FA). You should also consider placing a fraud alert on your credit report. A fraud alert is helpful because it requires lenders and creditors to go through additional steps to ensure your identity in case whoever hacked your Apple ID was planning on opening credit in your name.

How To Check Your iPhone for Viruses

You can check your iPhone for viruses by checking for unfamiliar apps, seeing if your data usage has spiked, seeing an unusual number of pop-up ads and noticing if specific apps are draining your battery. A virus is a type of malicious software that can infect any device, like your iPhone, and then replicate itself on your device’s programs or files.

Building a comprehensive Trust Center

In today's digital landscape, trust is paramount. Customers want to know that their data is secure and that they can rely on the companies they do business with. ‍ One of the best ways to provide this assurance is through a well-crafted, up-to-date Trust Center. But what exactly should go into a Trust Center? How easy are they to maintain, and how much manual work do they save security teams?

The Hidden Dangers and Opportunities of Generative AI: What Enterprises Need to Know

Since the launch of ChatGPT in November 2022, generative AI (genAI) has seen rapid enterprise adoption. According to researchers in the Netskope Threat Labs, as of June 2024, an astonishing 96% of organizations are using various types of genAI apps. This widespread adoption is transforming how businesses operate, but with great power comes great responsibility—and risk.

WatchGuard Endpoint Release Process

Recent news of a global IT disruption caused by a security vendor’s content update has driven important conversations about quality assurance processes for endpoint products and content updates. At WatchGuard, with more than 30 years of experience in this industry, we know well the sensitivity of the update process and wanted to take this opportunity to highlight the processes we have in place to protect our valued partner community and customers from the impacts of a flawed update rollout.