Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

TrustCloud Product Updates: June 2023

Coming soon TrustCloud’s New Platform Experience Get ready for a new and improved homepage that gives you a high-level snapshot of your compliance program, risks, employee compliance, automation status, and audit preparedness—all without toggling between apps. See a sneak peek. Coming soon Ask questions, get answers in TrustCloud Forums We created FlightSchool to help you learn about our products, GRC, and trust. Now, you can join the conversation with FlightSchool Forums!

Android Malware Outbreak: Unmasking the RAT Inside a Screen Recording App

With the worldwide popularity of Android and its open-source software, hackers have an increased incentive and opportunity to orchestrate attacks. A Google search for “Android malware” brings up headlines like these, all from the past few days or weeks: SecurityScorecard recently analyzed a specific threat known as the AhMyth RAT (remote access trojan), which made headlines for infiltrating a popular screen recording app on the Google Play Store.

Securing Privileged Access in a Remote Work World: Challenges and Best Practices

In today's disconnected world, the task of managing privileged access has become increasingly challenging. The surge in remote work has exposed employees to new vulnerabilities as they access sensitive systems and data from unsecured networks and personal devices, making them attractive targets for cyberattacks. To combat these risks, organizations must adopt Privileged Access Management (PAM) solutions.

Building a security-conscious CI/CD pipeline

Continuous integration (CI) and continuous delivery (CD) has become a ubiquitous practice for DevOps teams. The CI/CD process focuses on building and deploying new applications or releasing updates to already-deployed workloads. As a result, most CI/CD efforts focus on enhancing development speeds. However, CI/CD practices can accomplish much more than enabling workload deployments.

The importance of verifying webhook signatures

Webhooks are a callback integration technique for sending and receiving information, such as event notifications, in close to real-time. Webhooks can be triggered by application events and transmit data over HTTP to another application or third-party API. You can configure a webhook URL and connect external participants to customize, extend, or modify workflows. Webhooks may or may not be signed.

Understanding Proxies: The Four Principal Use Cases

The function of a proxy can be likened to that of a mediator between a device and the internet at large. By substituting your IP address with its own, a proxy intercepts and manages all of your traffic. Using a separate IP address can be advantageous for several reasons. For instance, proxy servers afford the user more governance over their internet access, offering control over the amount of data that websites and services can acquire about you.

Residential vs. Datacenter Proxy: A Comprehensive Comparison

Proxies play a transformative role in expanding the possibilities of internet usage. While both datacenter and residential proxies offer the benefit of hiding your real IP address and ensuring online privacy, they also have additional features that set them apart. In this article, we will delve into the details of these proxies, highlighting their differences and helping you make an informed choice.

Deciphering the Differences: Proxy vs. VPN

When it comes to fortifying the privacy and security of your internet connection, proxies and VPNs (Virtual Private Networks) typically emerge as the go-to options. Both these tools excel at safeguarding your online identity, leading many businesses, institutions, and individuals to use them interchangeably. However, they operate quite distinctively. To decide on the most suitable tool for your browsing requirements, it’s vital to comprehend their differences.

MOVEit mayhem: Attackers found, patch released, but no end in sight

The entire cybersecurity realm is buzzing over zero-day vulnerabilities and SQL injection attacks owing to the MOVEit Transfer MFT breach. In case you missed it, here’s the back story, timeline of events, and latest updates. On May 31, 2023, Progress Software rolled out security patches for the recently discovered SQL injection vulnerability in their file sharing application, MOVEit Transfer.