Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why Log Analytics is Key to Unlocking the Value of XDR for Enterprises

Cyber threats are becoming more sophisticated, and enterprise security teams are under constant pressure to improve and enhance their threat detection and response capabilities. But as security teams expand their security logging tools and capabilities, the burden of monitoring those tools and investigating alerts grows exponentially.

Choosing the Right Keeper Plan for Your Business

Increased security risks, heightened compliance regulations, distributed workforces and personnel turnover all create password-related challenges that have prompted organizations across the globe to improve their cybersecurity posture. To this day, stolen and weak passwords are the leading cause of data breaches, yet most organizations have no visibility, security or control over their users’ passwords, credentials and secrets.

What does Genesis Market's demise mean for other sites selling digital identities?

As reported widely in the press, the Genesis Market is no more. On Tuesday 4th April 2023, the FBI seized control of the infamous marketplace that’d had hundreds of thousands of stolen digital identities for sale, replacing its login page with a takedown notice and call for further information from its users.

Timing out synchronous functions with regex

How hard can it be to support custom container image tags? Turns out… quite! I know this because my team has been busy at work on our new custom base image support for Snyk Container, andwe were tasked with the following problem: Given a tag, parse its parts to be able to compare it to other similar tags. It was a fun problem to solve, and we'd love to share how we got to our final solution!

New Jersey-Based Uber Drivers May Have Been Exposed in Latest Data Breach

Driving for companies like Uber is always risky, as you never know who you will pick up, where you will have to take them, and if your vehicle could break down. However, drivers should not have to worry about their identities while driving. Uber was just hit by a cyber attack back in December that hurt more than 77,000 employees, and it seems the company is suffering from another serious data loss that could impact some of its drivers, yet again.

1 in 8 Email Threats Now Make It Past Email Security Solutions

Phishing attacks that can evade detection by email scanners are improving their chances of reaching the inbox, thanks to an increase in the use of one specific attachment type. According to new data found in HP Wolf Security’s latest Security Threat Insights Report for Q4 of 2022, 13% of all email threats being sent make their way past layered email security defenses to reach the user’s inbox. This, up from the previously published finding of 11.7% of threats doing so by Acronis.