Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Inside a Cyberattack: How Hackers Steal Data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organisation, particularly as the cybercrime industry becomes increasingly sophisticated and their technology more advanced. Furthermore, once a hacker has broken through an organisation's defences, it is relatively easy to move within the network and access information without being detected for days and even months. This is a significant concern for Banking and Financial Services organisations, which house valuable sensitive and Personally Identifiable Information (PII).

Exploring the unlikely relationship between hackers and the state with Emily Crose

Emily Crose, a veteran cybersecurity professional at agencies including the CIA and the Department of Homeland Security, had a question: How did hackers – a “weird” group of outsiders (herself included) – become sought-after collaborators with governments?

What is the Salt Typhoon Hack and What Will it Mean for Cybersecurity?

What if your most personal chats, the very foundation of your digital existence, were exposed? Unfortunately, that’s precisely what happened with the Salt Typhoon Hack on July 2024, a terrible cyberattack that put big U.S. telecom companies at risk. The scale of this intrusion has never been seen before. Malicious actors accessed sensitive data such as call logs, metadata, and even interactions with key political officials.

How the SMS Hack Exposed U.S. Telecom Security Risks

Popularly known as text messages, SMS messages are one of the widely used communication channels by Americans. They are generally used for various purposes. For instance, besides being a channel of communication among individuals, several millions of Americans rely on SMS systems to access and secure their social media, email, and online banking accounts, particularly through OTPs (one-time-passcodes), which are typically delivered via SMS.

'Tis the Season: How to Strengthen Your Defenses Against Holiday Hacking

For an enterprise business, the holidays can be a mixed bag. On the one hand, depending on your industry, you’re either winding down or doing the most business you’ll do all year. On the other, you’re especially vulnerable to holiday hacking attempts. Your customer data makes your organization an attractive target at a time when employee vacation time and office closures mean you have fewer employees to guard against holiday hackers.