Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to pick a product problem worth solving

Life is full of problems. A product manager's life is that, and more! But it’s also the very reason we have been able to contribute to many, many awesome products. Since becoming a product manager, I’ve learned that the problems worth solving aren't always easy to spot and you have to do some sifting, rejecting and re-framing to get to the good stuff.

TEMU phishing attacks using spyware up 112% in the run up to Christmas

As the most downloaded app in the world right now, the number of TEMU impersonation emails has increased by 112% since October 1st, 2023. As discounts and spending-based reward coupons form a substantial part of TEMU’s awareness campaigns, the company is reportedly spending $2bn annually on marketing. As the brand continues to grow in popularity, cybercriminals are increasingly leveraging it to lend authenticity to their spoofing attempts.

Missing the Lock Icon in Chrome's Address Bar? It's a Move to Make You More Secure

In response to what Google calls “over trust” in the web address lock icon to indicate that a site is authentic and its’ communications are secure, they’ve swapped the lock out in an attempt to engage Chrome users in thinking about their own secure browsing. You may have not noticed it if you’ve updated to Google Chrome version 120, but the long-familiar lock icon is no longer.

Underground Cyber Crime Marketplaces are Now Showing Up on the Open Web

Marketplaces such as OLVX are shifting from the dark web to the open web to take advantage of traditional web services to assist in marketing to and providing access to new customers. One of the challenges of existing on the dark web is the need to use a Tor browser and have some knowledge of how to navigate your way through the dark web’s depths. In addition, customers of dark web services may not be as readily accessible to advertising as they would be on the open web.

NIST Cybersecurity Framework 2.0: The Key Changes to Know About

The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) has been a stalwart ally for organizations for years, providing guidance on understanding, evaluating and communicating about cybersecurity risks. The release of NIST CSF 2.0, expected in early 2024, provides a paradigm shift. This blog post provides an in-depth exploration of the structure of the NIST CSF and the key changes coming in version 2.0.

Enhancing Cybersecurity in the Financial Industry

The importance of robust cybersecurity practices cannot be overstated, especially when it comes to critical infrastructure, such as the financial industry. Financial institutions, in particular, are entrusted with sensitive data and financial assets, making them prime targets for cyber threats. One crucial aspect of cybersecurity that often goes under the radar is third-party risk management (TPRM).

Vulnerability Remediation for Servers: Beyond Just Patching

To understand vulnerability remediation one must first understand remediation in cyber. Remediation refers to the process of addressing and resolving security vulnerabilities or incidents that could potentially pose a threat to an organization’s information systems, data, or network.