Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CISA, NSA, FBI, and MS-ISAC Release Phishing Prevention Guidance

October 18, 2023, the Cybersecurity Infrastructure and Security Agency (CISA), the National Security Agency (NSA), the Federal Bureau of Investigation (FBI), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) released a joint guide, Phishing Guidance: Stopping the Attack Cycle at Phase One.

Phishing-as-a-Service: As Simple As Uploading A Logo

Researchers at Fortra are tracking “Strox,” one of the most popular phishing operations of the past two years. Users of Strox phishing kits can easily create phishing campaigns by simply submitting a logo for the brand they want to impersonate. “Currently, twelve phishing kits are sold on Strox for $90 USD each.

Is Public Wi-Fi Safe? 7 Top Tips for Surfing Safely on the Web

We rarely find ourselves without access to the Internet, thanks to the increased number of public Wi-Fi networks or hotspots wherever we go. From our local coffee shops, libraries, or shopping centers, connecting to the web is easier than ever. But is it more secure? Since 2019, the rise of remote workers and digital nomads means we are more reliant on public Wi-Fi to get our jobs done and to carry out our daily tasks, from online shopping, to emails and video conferences.

What We Learned from the 2023 Annual Cybersecurity Attitudes and Behaviors Report

In the brisk air of early autumn, optimism fills our hearts as we celebrate the 20th anniversary of Cybersecurity Awareness Month, an annual event dedicated to fostering a deeper understanding of cybersecurity and inspiring behavior change. Two decades ago, the prevailing belief among security professionals was that raising awareness alone could lead to secure online behaviors. But in 2023, we've learned that hope is not a strategy.

Ex-Navy IT manager jailed for selling people's data on the dark web

A former US Navy IT manager has been sentenced to five years and five months in prison after illegally hacking a database containing personally identifiable information (PII) and selling it on the dark web. 32-year-old Marquis Cooper, of Selma, California, was a chief petty officer in the US Navy's Seventh Fleet when he opened an account in August 2018 with a company that maintains a PII database for millions of people.

Guarding the Vault: Unmasking Cyber Threats Facing the Financial Sector in 2023

Banks and other financial institutions have the one thing every criminal desires. Money. So, it only makes sense that cybercriminals prioritize attacking this industry sector, and it makes even more sense for these institutions to harden their systems to prevent attacks.

Why are organizations failing to detect cybersecurity threats?

With the changing security landscape, the most daunting task for the CISO and CIO is to fight an ongoing battle against hackers and cybercriminals. Bad actors stay ahead of the defenders and are always looking to find new vulnerabilities and loopholes to exploit and enter the business network. Failing to address these threats promptly can have catastrophic consequences for the organization.

Recapping NASCIO's 2023 Annual Conference: Workforce Shortages, AI, and Whole-of-State Cybersecurity

If you were at the National Association of State Chief Information Officers (NASCIO) conference in Minneapolis last week, you might have noticed a wide array of topics that were top-of-mind for state CIOs across the United States.

GitHub Copilot code security: XSS in React

In an evolving era of Artificial Intelligence (AI) and Large Language Models (LLMs), innovative tools like GitHub's Copilot are transforming the landscape of software development. In a prior article, I published about the implications of this transformation and how it extends to both the convenience offered by these intelligently automated tools and the new set of challenges it brings to maintaining robust security in our coding practices.

Penetration Testing: A Complete Guide

Penetration testing is a pre-defined set of procedures used to identify any unknown weakness in the IT infrastructure of a business. It involves attempts to exploit vulnerabilities, which may exist in services and application flaws, operating systems, risky end-user behaviour, or improper configurations, to validate the efficacy of protection mechanisms and end-user observation of security policies.