Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Securing APIs through penetration testing

APIs (Application Programming Interfaces) have become the backbone of many modern applications, and indeed the foundation of some businesses services. APIs enable seamless communication between applications, services and systems, allowing organisations to innovate, collaborate and deliver value to their customers. However, as reliance on APIs grows, so does the need for robust security measures to protect these critical digital assets from potential threats.

GitHub Advanced Security Features And Security In Jira

When it comes to software development, security is a necessary element. That is why we will analyze GitHub Advanced Security and how Jira supports this DevSecOps feature. GitHub Advanced Security brings a range of tools to the table, such as code scanning, secret scanning, and dependency review – customized to identify vulnerabilities before they escalate. Jira integrates project management, turning the complex task of tracking and managing security issues into a streamlined process.

DragonForce Ransomware - What You Need To Know

A relatively new strain of ransomware called DragonForce has making the headlines after a series of high-profile attacks. Like many other ransomware groups, DragonForce attempts to extort money from its victims in two ways - locking companies out of their computers and data through encryption, and exfiltrating data from compromised systems with the threat of releasing it to others via the dark web.

Nitrogen Campaign: A Threat Targeting Tech and Non-Profit Sectors in North America

Foresiet Security Intelligence has recently uncovered the Nitrogen campaign, which has set its sights on numerous organizations within the technology and non-profit sectors across North America. While Foresiet managed to intercept the infections before significant hands-on-keyboard activity took place, there are strong indications that threat actors are leveraging this infection chain to establish compromised environments for deploying ransomware.

Malvertising Campaigns Surged in 2023

Researchers at BlueVoyant observed a 50% increase in large-scale malvertising campaigns in 2023 compared to 2022. “Fraudulent search engine ads appear as benign advertisements, almost indistinguishable from legitimate ones,” the researchers write. “This makes ads a highly effective distribution mechanism since users often rely on the top search result rather than directly typing in a domain.

Top Tax Scams of 2024 Your Organization Should Watch Out For

As the April 15, 2024 filing deadline approaches, tax scammers are working overtime to take advantage of rushed or stressed taxpayers. This tax season, scammers have adopted more sophisticated techniques - particularly leveraging artificial intelligence (AI) to disguise their schemes. However, remaining vigilant and taking some simple precautions can help you avoid becoming a victim.

Continuous Threat Exposure Management (CTEM) - Automation & Management

In a time where cyber threats evolve as swiftly as the technologies they target, organizations need a strategic approach to rise above the noise while effectively reducing risk. Enter Continuous Threat Exposure Management (CTEM) — a paradigm-shift in cybersecurity introduced by Gartner. In this article, we compare and contrast CTEM with a closely related, traditional approach – vulnerability management – and discuss practical ways to apply CTEM in your organization.

Nine Docker pro tips for Node.js developers

If you spend quite a bit of time in the command line, working with Docker images and containers locally to build and test them, you might be in the mood for some power-user Docker commands. We're skipping the basics and diving straight into the lesser-known yet highly effective commands that can significantly improve your Docker experience.