Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A Decade of Forward Thinking

According to Forbes, 90% of startups fail. According to the Harvard Business Review, the number is closer to 70%, but whichever number you choose to believe, the odds are still staggeringly stacked against young new ventures. At Forward Networks, we just had a terrific time two weeks ago celebrating the company’s 10th anniversary. Ten years is impressive by any measure, but especially so in the cutthroat universe of Silicon Valley tech startups.

Progressive Insurance Hit By a Data Breach Putting 347,100 Customers at Risk

Progressive is a large insurance company based in Mayfield Village, Ohio. The company is known throughout the United States and other parts of the world and is responsible for insuring many US citizens. The organization employs over 49,000 workers and generates an estimated $48 billion in annual revenue. Since Progressive is an insurance company, it handles personal data, medical information, and other sensitive details about individuals.

How to Back up and Restore AWS Elastic Load Balancers for EKS Clusters

Load balancers are an integral component of any production environment. They allow the distribution of traffic across multiple available backend servers so that no single server becomes overwhelmed due to traffic. A load balancer can be configured for workloads running on AWS through the Elastic Load Balancer (ELB) service. At a high level, an ELB consists of 3 main components: AWS offers 3 different types of Elastic Load Balancers.

LinkedIn Accounts Under Attack

In recent weeks, the Cyberint research team has observed an alarming emerging trend – an ongoing and successful hacking campaign is targeting LinkedIn accounts, all following a consistent method. This campaign is currently affecting individuals worldwide, resulting in a significant number of victims losing access to their accounts. Some have even been pressured into paying a ransom to regain control or faced with the permanent deletion of their accounts.

One Drive, Double Agent: Clouded OneDrive Turns Sides

Over the past few years, ransomware has emerged as one of the most significant cybersecurity threats. Recent research conducted by Sophos indicates that the situation is becoming increasingly dire. Notably, the payments demanded by ransomware groups have surged, making the attacks even more costly for victims. Additionally, an alarming 66% of organizations have reported being targeted by ransomware attacks in the last two years alone.

Operationalizing Identity Security in the Public Cloud

As enterprises increasingly migrate to the public cloud, identity and access management (IAM) inconsistencies across different cloud providers pose a significant hurdle. Effectively securing identities in this complex landscape has proven to be a challenge. Discussions with industry analysts and enterprise clients have highlighted a prevalent issue: the existing security tool suite often falls short in providing actionable measures to weave identity security into cloud operations.

Firewall troubleshooting steps & solutions to common issues

Problems with firewalls can be quite disastrous to your operations. When firewall rules are not set properly, you might deny all requests, even valid ones, or allow access to unauthorized sources. There needs to be a systematic way to troubleshoot your firewall issues, and you need to have a proper plan. You should consider security standards, hardware/software compatibility, security policy planning, and access level specifications.

Navigating the complex landscape of dynamic app security with AlgoSec AppViz

In the fast-paced world of technology, where innovation drives success, organizations find themselves in a perpetual race to enhance their applications, captivate customers, and stay ahead of the competition. But as your organization launches its latest flagship CRM solution after months of meticulous planning, have you considered what happens beyond Day 0 or Day 1 of the rollout?

There's a New Stealer Variant in Town, and It's Using Electron to Stay Fully Undetected

Our threat research team recently uncovered new npm packages that are used to download a new info-stealer variant that uses the popular Electron framework to disguise itself as a legitimate application. In this blog post, we’ll analyze the attack flow of this new info-stealer we detected and explain how it can stay undetected by abusing trusted development tools like Electron.