Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Part 2: How Egnyte Built its Turnkey Retrieval Augmented Generation Solution

In Part 1 of this series, we explored the intricacies of language models' "Retrieval" aspect, delving into how these models search and pull relevant information from vast data repositories. As we continue our journey into understanding the inner workings of language models, let’s turn our attention to the next crucial stage, "Augmentation and Generation." In this blog post, we will explore the augmentation and generation phase, a process that is integral to the functioning of the RAG pipeline.

Rising Threat: How Encoded URLs are Evading Secure Email Gateways

In a concerning trend observed recently, threat actors are increasingly leveraging encoded URLs to bypass secure email gateways (SEGs), posing a significant challenge to email security defenses. According to recent findings by Cofense, there has been a notable uptick in attacks where threat actors manipulate SEGs to encode or rewrite malicious URLs embedded in emails. This tactic exploits vulnerabilities in SEG technologies, allowing malicious links to slip through undetected to unsuspecting recipients.

Life360 Data Breach Exposes Over 400,000 User Phone Numbers

A significant data breach has compromised the personal information of 442,519 Life360 customers due to a vulnerability in the company's login API. The breach, discovered in March 2024, has exposed sensitive user details, including email addresses, names, and phone numbers. This incident underscores the critical importance of robust cybersecurity measures, particularly for services handling vast amounts of personal data. Exploiting an Unsecured API Endpoint.

7 in 10 Organizations Experienced a Business Email Compromise Attack in the Last 12 Months

Despite ransomware getting the lion’s share of the tech pub headlines, business email compromise (BEC) attacks are alive and well… and having a material impact. New data from Arctic Wolf’s 2024 State of Cybersecurity report shows that BEC attacks – whether attempted or successful – are far more widely felt than previously thought.

Change Healthcare Ransomware Attack May Cost Nearly $2.5 Billion

The ransomware attack against UnitedHealth Group’s Change Healthcare platform is expected to cost the company up to $2.45 billion, more than a billion dollars more than was previously estimated, Cybersecurity Dive reports. The incident has already cost the firm nearly $2 billion.

What Is AWS AppFabric?

Cloud environments have revolutionized how organizations operate, providing scalable, efficient, and cost-effective resources. However, this shift to the cloud introduces new challenges, particularly in managing and securing many Software-as-a-Service (SaaS) applications that businesses rely on. AWS AppFabric exists to address these challenges by providing a solution for integrating, managing, and securing various applications.

How To Block EXE Files In Group Policy (& Other App Blocking Methods!)

In today’s digital landscape, safeguarding your organization’s network from unauthorized applications is paramount. One effective strategy is blocking executable (.exe) files using application blocking software or an Active Directory Group Policy. This tutorial will provide step-by-step guides that will teach you how to block executable files in Windows using various methods.

How to setup Deno Dev Container on GitHub Codespaces?

If you’ve been searching for guides and tutorials on getting started with Deno web development in a cloud IDE such as GitHub Codespaces, you’ve come to the right place. In this post, we will be exploring the world of Deno, GitHub Codespaces, and Dev Containers, providing you with the knowledge you need to set up your development environment effectively and efficiently in the cloud.