Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Threat-Loaded: Malicious PDFs Never Go Out of Style

In the realm of cybersecurity, danger hides where we least expect it and threats never, ever, go out of style! Over the past few months, Trustwave SpiderLabs has seen a rising trend in threat actors employing PDF documents to gain initial access through email-borne attacks. Though the use of PDF files as a malicious vector is not a novel approach, it has become more popular as threat actors continue to experiment with techniques to bypass conventional security controls.

Upgrade Your Cloud Storage Experience With This Alternative to Filen

Filen is a cloud storage company founded in 2020 in Recklinghausen, Germany. Like many alternative cloud storage providers, Filen aims to provide users with complete privacy for their files, securing them with zero-knowledge and end-to-end encrypted technology. If you’re interested in learning more about Filen, we’ll discuss how they focus on protecting your privacy online, their pricing, and other features.

What You Need to know about API security

When people talk about complex, interconnected ecosystems, they’re really talking about how applications share data and communicate with each other. Like the air-lock on a spaceship lets people pass between physical environments, Application Programming Interfaces (APIs) enable data to pass between digital environments. However, since APIs act as access points between applications, they create potential security risks.

Securing the smart cities of tomorrow: Cybersecurity challenges and solutions

Smart cities are on the rise. What was once squarely placed in the realm of science fiction is now a reality, and the number of smart cities worldwide continues to grow. According to a study by Research and Markets, the market for smart cities is expected to reach over 1 trillion USD by 2027.

Achieving NIS2 Compliance: Essential Steps for Companies

In an increasingly digital world, cybersecurity has become a critical concern for companies. With the rise of sophisticated cyber threats, protecting critical infrastructure and ensuring the continuity of essential services has become a top priority. The EU’s Network and Information Security Directive (NIS2), which supersedes the previous directive from 2016, establishes a framework to enhance the security and resilience of network and information systems.

NIS 2 Directive: Leveraging regulatory compliance and technology to reduce risk

Cyber threats pose a significant risk to organizations due to today's increasingly interconnected digital landscape. To address these challenges and ensure the security and resilience of critical infrastructure and digital services, the European Union introduced the Directive (UE) 2022/2555, commonly known as NIS 2 - which was actually approved on the same day as DORA, both being critical in how the EU is leveraging regulatory compliance and technology to reduce cyber risk.