Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Five worthy reads: Cyberattacks in the banking industry

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore cyberattacks in the banking industry. Gone are the days when paychecks were rolled out in envelopes on payday. We’ve evolved from juggling between counters to deposit a check to managing everything through a single mobile banking application. Indeed, modern banking saves us time and encourages self-service.

Cybersecurity in Web Development: Best Practices for Secure Sites

Creating a website takes more than designing it to be visually appealing and user-friendly. Due to increased cyber threats, web developers have a challenge on their hands as they are required to observe security measures for both the users and the website. There is a high possibility of incurring costs due to reputation loss and business losses due to security breaches, thus emphasizing the need for the incorporation of security into every stage of web development. Everything must be perfectly safe, so we decided to ask professionals from paspartoo.com what things really matter.

CDK Ransomware Attack: What It Is and How to Protect Your Business

Software platforms are being used more and more by companies to run their operations, store private data, and talk to customers. Ransomware attacks are becoming more common because people depend on them so much. One of the scariest types of hacks is the CDK ransomware attack, which is aimed at companies that use software from CDK Global.

Living-off-the-land Attacks: The Challenge and WatchGuard Advanced EPDR

In cybersecurity, "Living-off-the-land" (LotL) attacks have become increasingly difficult to detect. These attacks exploit legitimate system tools like PowerShell, WMI, or Office macros instead of relying on external malware, allowing attackers to move stealthily within a network. Traditional security measures struggle to identify these attacks, as they use trusted, digitally signed tools. LotL attacks appeal to cybercriminals because they evade detection and reduce the risk of being traced.

Why Choose a Cloud-Native Approach to Fend Off API Attacks

As organizations adopt a “digital-first” mentality, APIs have essentially become the backbone of modern applications, providing seamless integration between services, platforms, and third-party systems. For businesses, APIs help streamline processes and for consumers, APIs enable smooth and easily accessible digital services. However, an increased reliance on and growing number of APIs has also made them prime targets for cyberattacks.

Understanding Network Attacks: Types, Trends, and Mitigation Strategies

At a time when digital connectivity is the lifeblood of all business operations, the specter of network attacks is greater than ever. As entities depend on complex network infrastructures, malefactors exploit vulnerabilities with growing sophistication and frequency. Understanding the diverse nature of these threats—from DoS and DDoS attacks to reconnaissance exploits—is crucial for devising effective defense strategies.

FINRA Warns of Rising Risks as Third-Party Cyberattacks Threaten Financial Services

Earlier this month, the Financial Industry Regulatory Authority (FINRA) posted a cybersecurity advisory highlighting the recent cybersecurity risks of third parties impacting its members and financial services organizations. The recently released Trustwave SpiderLabs 2024 Trustwave Risk Radar Report: Financial Services Sector underscores FINRA's concern about the escalating threat landscape facing the financial industry.

Warnings After New Valencia Ransomware Group Strikes Businesses and Leaks Data

A new ransomware operation has started to leak information it claims has been stolen from organisations it has compromised around the world. In recent days Valencia Ransomware has posted on its dark web leak site's so-called "Wall of shame" links to gigabytes of downloadable information that has seemingly been exfiltrated from a Californian municipality, a pharmaceutical firm, and a paper manufacturer.

The Machine War Has Begun: Cybercriminals Leveraging AI in DDoS Attacks

In the digital landscape, the integration of Artificial Intelligence (AI) into cybercriminal activities has marked the beginning of a new era of threats. The “machine war” has indeed commenced, with AI enhancing the scale and sophistication of cyberattacks. Distributed denial of service (DDoS) attacks, in particular, have become more formidable with AI’s capabilities, presenting significant challenges for cybersecurity defenses.