Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Users Clicking on Multiple Mobile Phishing Links Increases 637% in Just Two Years

New data shows that phishing mobile devices as an attack vector is growing in popularity – mostly because it’s increasingly working... in exponential terms. We all know phishing is the number one attack vector. But we should wonder whether phishing attacks that hit a corporate desktop email client or a mobile device are more impactful.

Latest Salt Accolades - Customer Award + Cyber 66

I’m excited to share the latest evidence of Salt leadership in API security, with two powerful tributes. First – Salt Security has been honored as winning the “Peace of Mind” category during the first-ever Ally Technology Partner Awards! Ally Financial, the nation’s largest digital-only bank and leading auto finance company, highlighted five suppliers for their outstanding service excellence across a broad array of criteria.

Practical advice to secure your expanding attack surface

The other week, BitSight published research identifying thousands of organizations using internet-facing and exposed webcams with many video and audio feeds susceptible to spying. The potential consequences are serious – an attacker could potentially view private activities and eavesdrop on sensitive conversations, presenting a variety of privacy and security concerns. Below are some of the screenshots BitSight captured from exposed devices (blurred for privacy).

Lose the Bias: Young Cybersecurity Experts Want a Modern Workplace That Includes Women Leaders

2023 finds us in a sustained cybersecurity hiring crisis. With 3.4 million too few experts to meet global demand, it seems the widespread investments in university programs, increased certification access, and upskilling for existing IT professionals isn’t enough to bridge the gap.

Ultimate Security Checklist to Launch a Mobile App in the United Kingdom - iOS & Android

Mobile apps have made our lives a lot easier. From ordering food, watching movies, booking a cab, and sending money, one can do everything via mobile apps. However, while mobile apps are a great utility, they've become an easy target for scammers, hackers, and cyber attackers, especially in countries like the UK. Taking charge of the situation, the UK government has created strict guidelines for enhancing the security of mobile apps.

How CIAM safely orchestrates your customers' journey and its benefits

Customers’ willingness to give you their personal data begins with the experience they receive. Convincing them requires the right tone, an outlook of what they’ll get in return, and most importantly, a high level of trust. But while companies depend on customer data to unlock growth, user-centric data collection can be tricky. 43% of U.S.

SharePoint Security: 8 Most Common Vulnerabilities

Once written off as a failed CMS incapable of generating a significant user base, Microsoft’s SharePoint has continually defied expectations to become one of the most widely-used ECM and Collaboration products ever. It caters to over 200 million users and 250,000 organizations, including 85% of Fortune 500 companies. SharePoint is a user-friendly intranet portal and provides a consolidated center for document sharing, tracking, and overall project management.

Guidelines: How to reduce the noise of Falco rules in Sysdig Secure

Rule tuning is one of the most important steps during the definition of the security posture. With the detection rules, it’s impossible to use a “one fits all” approach: every customer has a unique environment, with its peculiarities and business needs. So, when a new rule is released it’s crucial to understand the security use case behind the detection and reduce the false positives (FP) as much as possible. The Threat Research Team constantly checks if noise occurs.

Penetration Testing vs Vulnerability Scanning: What's the Difference?

Penetration Testing (also known as pentesting or ethical hacking) is a simulation of an attack on a computer system, network, or web application to identify potential security vulnerabilities and gauge the effectiveness of existing security measures. These are typically performed by cybersecurity professionals with specialised knowledge and experience in identifying and exploiting system vulnerabilities.