Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Common Etsy Scams to Avoid

Etsy, since 2005, has been a marketplace for millions of small business owners, selling everything from jewelry to toys. Without a doubt, an online criminal is lurking around every virtual corner. It is estimated that nearly six to eight million individual shop owners are doing business on the Etsy platform. One of the significant aspects of using Etsy to sell your goods is they offer fraud protection in which they pay for any fraudulent transaction under $250.

Why Log Analytics is Key to Unlocking the Value of XDR for Enterprises

Cyber threats are becoming more sophisticated, and enterprise security teams are under constant pressure to improve and enhance their threat detection and response capabilities. But as security teams expand their security logging tools and capabilities, the burden of monitoring those tools and investigating alerts grows exponentially.

Choosing the Right Keeper Plan for Your Business

Increased security risks, heightened compliance regulations, distributed workforces and personnel turnover all create password-related challenges that have prompted organizations across the globe to improve their cybersecurity posture. To this day, stolen and weak passwords are the leading cause of data breaches, yet most organizations have no visibility, security or control over their users’ passwords, credentials and secrets.

Introducing Calico Runtime Threat Defense-The most extensive security coverage for containers and Kubernetes

Containerized applications are complex, which is why an effective container security strategy is difficult to design and execute. As digitalization continues to push applications and services to the cloud, bad actors’ attack techniques have also become more sophisticated, which further challenges container security solutions available on the market.

What does Genesis Market's demise mean for other sites selling digital identities?

As reported widely in the press, the Genesis Market is no more. On Tuesday 4th April 2023, the FBI seized control of the infamous marketplace that’d had hundreds of thousands of stolen digital identities for sale, replacing its login page with a takedown notice and call for further information from its users.

Timing out synchronous functions with regex

How hard can it be to support custom container image tags? Turns out… quite! I know this because my team has been busy at work on our new custom base image support for Snyk Container, andwe were tasked with the following problem: Given a tag, parse its parts to be able to compare it to other similar tags. It was a fun problem to solve, and we'd love to share how we got to our final solution!

New Jersey-Based Uber Drivers May Have Been Exposed in Latest Data Breach

Driving for companies like Uber is always risky, as you never know who you will pick up, where you will have to take them, and if your vehicle could break down. However, drivers should not have to worry about their identities while driving. Uber was just hit by a cyber attack back in December that hurt more than 77,000 employees, and it seems the company is suffering from another serious data loss that could impact some of its drivers, yet again.