Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What You Need to Know about the Harvard University Data Breach

Harvard University is the oldest college in the American colonies and one of the most prestigious universities in the United States. It has over 400,000 alumni worldwide and about 20,665 faculty and staff across more than 20 locations globally. The university recently disclosed a data breach in its Alumni Affairs and Development system (AAD) that contained information about people and groups associated with the institution.

How Machine Learning Transforms Security Alert Chaos into Actionable Intelligence

Learn how GitGuardian’s ML-powered risk scoring turns 10,000 noisy secrets alerts into a prioritized, actionable queue, tripling analyst efficiency, boosting critical detection 5× over rule-based systems, and safely auto-closing over a third of low-risk incidents.

How to Get Your Information Off the Dark Web: Steps to Take

Seeing your personal data exposed on the dark web would certainly make you hit the panic button. But instead of panicking, you should focus on how to get your information off the dark web. The sooner you take a suitable action, the lower the chances of damage to your data, finances, and reputation. Let’s find out more about how data gets leaked on the dark web and how it can be taken down.

Why traditional black box testing is failing modern AppSec teams

Applications have long evolved from monolithic structures to complex, cloud-native architectures. This means that the tried-and-true methods we rely on are becoming dangerously outdated. For AppSec to keep pace, we must look beyond current tooling and revisit the very fundamentals of DAST – the automated discipline of black box testing.

One-Size-Fits-All Security Training Fits Nobody

Here's a curious thing about people, sometimes we crave the familiar, and sometimes we demand the novel. Go see Metallica live. What do you want? Enter Sandman. Master of Puppets. The songs you know by heart. Play some deep cut from a B-side and watch 50,000 people suddenly become very interested in their phones. But go see your favourite comedian and the contract flips entirely. Tell me a joke I've heard before and I'll ask for my money back. The difference?

Phishing Campaign Uses Fake Party Invites to Deliver Remote Access Tools

A large phishing campaign is using phony seasonal party invites to trick users into installing remote management and monitoring (RMM) tools, according to researchers at Symantec. “A highly active threat actor that specializes in using the ScreenConnect remote management and monitoring (RMM) software in its attacks has changed tactics and is now infecting its victims with multiple RMM tools, including LogMeIn Resolve and Naverisk,” Symantec says.

Black Friday: How to Protect Your Retail Clients from Ransomware

Black Friday is one of the most demanding seasons for the retail sector. Massive spikes in online traffic, aggressive promotions, and pressure to keep services available significantly increase the risk of an attack. Cybercriminals are aware of this and exploit the saturation to launch ransomware campaigns, phishing attempts, and supply chain attacks that aim to disrupt operations, steal sensitive data, and cause maximum impact.

FedRAMP IaaS vs PaaS vs SaaS - What's The Difference?

If you’ve browsed the FedRAMP marketplace in the interest of using a government-certified service, either as part of your own services or on behalf of an agency, you’ve likely seen the various -aaS designations. The “aaS” stands for “as a Service”, and it’s part of how modern internet services function. What are the different kinds of services, and how do they engage with FedRAMP? The differences can be important.

Goshen & Hancock Settle Meta Pixel Lawsuits: Healthcare Tracking Risk

Two Indiana healthcare providers, Goshen Health System and Hancock Regional Hospital, recently reached settlements tied to the use of website tracking technologies, including Meta Pixel. Neither organization admitted to any deliberate misconduct, emphasizing that the settlement is done to avoid the cost and disruption of continued litigation.