Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Detecting and Preventing Reconnaissance Attacks

In 2024, every business across the world is already aware of the looming potential of a cyber attack. With billions of dollars pouring into the cyber criminal market each year, hackers have more backing to create large-scale attacks, breaching financial records, private data, and customer information. Reconnaissance attacks are the first step in many of these major breaches. By scouting out a business, collecting information about its security posture, and aiming to identify vulnerabilities, these initial attacks give hackers the data they need to launch precise, damaging attacks.

What is DLL Hijacking? How to Identify and Prevent DLL Hijacking?

Ever happened – you clicked a random link by mistake but discovered your system working strangely? Maybe some programs crash, data goes missing, or pop-ups plague your screen. It could be a malicious threat within your system, or simply, your system is the victim of a DLL Hijacking. DLL Hijacking is a type of cyberattack that allows the attacker to steal your data or even take control of your system.

What is Unrestricted Code Execution? How to Defend Organizations Against this Attack?

Nowadays, with more organizations and individuals relying heavily on third-party software to execute their high-priority and covert tasks, the risks of data breaches or cyber-attacks are becoming a serious issue. A cyber attack is basically an attempt by cybercriminals, hackers, or other digital adversaries to access a computer network or system with a willingness to expose, alter, steal, or destroy your million-dollar information.

What Is a Silver Ticket Attack?

A ticket in cybersecurity is a set of credentials used to authenticate users. A silver ticket is a forged ticket an unauthorized user creates. With this forged silver ticket, threat actors can launch a cyber attack that involves exploiting the weaknesses of a Kerberos authentication system. In this system, a Ticket Granting Service (TGS) serves as the credential token, granting authorized users access to particular services.

The Top 11 Legal Industry Cyber Attacks

A law firm can only be successful if it can meet the needs of its clients, and few components put that success at risk more than the rising danger and repercussions of a cyber attack. In addition to the time, effort, and money a firm must spend responding to a successful breach, employees may find themselves unable to access the firm’s technology and, therefore, unable to bill hours.

JFrog Security research discovers coordinated attacks on Docker Hub that planted millions of malicious repositories

As key parts of the software ecosystem, and as partners, JFrog and Docker are working together to strengthen the software ecosystem. Part of this effort by JFrog’s security research team involves continuous monitoring of open-source software registries in order to proactively identify and address potential malware and vulnerability threats.

Preventing Magecart Attacks Through Supply Chain Vulnerabilities

The digital supply chain refers to the chain of third-party digital tools, services and infrastructure that is depended on for a particular first-party service (such as your website or SaaS platform). In an ever-changing digital landscape, supply chains can be brittle with many unseen risks. The nature of supply chain risk is transitive; any part of the often long and complicated digital supply chain can be compromised, causing all components downstream of it to also be compromised.

Targeted Smishing Attacks by Threat Group "The Com" On The Rise

Cyber activity by the group "The Com," which leverages (SIM) swapping, cryptocurrency theft, swatting, and corporate intrusions, is increasing. Security researchers at Intel471 have published an analysis of the threat group, “The Com” (short for “The Community”), providing details about their targets and tactics. Operating mostly from Canada, the U.S.