Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Integrating Security to DevOps: Fundamental Principles Are Crucial!

Changing consumer demands posed a serious challenge to the IT industry; it pushed firms to brainstorm about quick product delivery. This demand eventually gave rise to the demand for collaboration between Development (Dev) and Operations (Ops) teams, welcoming the DevOps trend. As a result, everything started progressing well with increased development, enhanced collaboration, advanced testing, high productivity and minimized time to market.

File Integrity Monitoring Best Practices

Nowadays, most of the IT systems use file-based architectures to store and process information. In addition, the critical applications such as operating systems, application binaries, configuration data of systems and applications, organization’s sensitive data, logs, and data which is pertinent to security events are stored in files. If any of these files is compromised, the financial and reputational damage occur to organizations.

Don't Trade Convenience for Security: Protect the Providence of your Work

I recently volunteered as an AV tech at a science communication conference in Portland, OR. There, I handled the computers of a large number of presenters, all scientists and communicators who were passionate about their topic and occasionally laissez-faire about their system security. As exacting as they were with the science, I found many didn’t actually see a point to the security policies their institutions had, or they had actively circumvented them. A short survey heard reasoning like.

Gamers risk getting played by hackers

If you’re in your mid-twenties or beyond, you will be familiar with people at family gatherings saying ‘remember when we didn’t have all these gadgets, and we used to actually talk to each other?’ The answer to this is ‘no’ – the level of conversation has remained largely unchanged, it’s just now we have gadgets and gizmos to occupy our attention during these moments of strained silence. I put it down to the Mandela effect.

Weekly Cyber Security News 06/09/2019

A selection of this week’s more interesting vulnerability disclosures and cyber security news. A great example of (half) forgotten linked app this week via, quite unforgettably, from the Twitter CEO. I’m sure we all have linked services together as authentication of to bridge a data conduit just to do a trial or something and neglected to remove it afterwards. Well…. That lapse could come back to bite in the future.

New Zealand Businesses and Citizens Report Record Losses Due to Cybercrime

The latest report published by the New Zealand Computer Emergency Response Team (CERT NZ) found that the country experienced its highest ever recorded quarterly financial losses due to cybercrime in Q2. The report claims that New Zealanders reported $6.5 million in direct losses nationwide in Q2 of 2019. A total of 1,197 incidents were recorded in the second quarter, over 21% more than the incidents reported in the first quarter.

Ransomware experiences and why IT security professionals have a lot on their minds

Every year we survey visitors to our booth at Black Hat about trending topics. This year, we asked about ransomware and the ever-increasing complexity of our cybersecurity environment. The results are very interesting - things may be getting much better, or we may all be collectively in denial. Let's break it down.

How we tracked down (what seemed like) a memory leak in one of our Go microservices

The backend developer team at Detectify has been working with Go for some years now, and it’s the language chosen by us to power our microservices. We think Go is a fantastic language and it has proven to perform very well for our operations. It comes with a great tool-set, such as the tool we’ll touch on later on called pprof. However, even though Go performs very well, we noticed one of our microservices had a behavior very similar to that of a memory leak.

400 Million Facebook Users' Phone Numbers Exposed

The phone numbers associated with over 400 million Facebook accounts were exposed online in the latest privacy dilemma for the social media giant. TechCrunch reported on Wednesday that an exposed server storing 419 million records was found online - 133 million belonging to U.S. users, 50 million Vietnamese users, and 18 million U.K. users. This server was not protected with a password, meaning anyone could access the database up until late yesterday evening once the host took down the site.

What Is a Man-in-the-Middle Attack and How Can It Be Prevented

A man-in-the-middle attack (MITM attack) is a cyber attack where an attacker relays and possibly alters communication between two parties who believe they are communicating directly. This allows the attacker to relay communication, listen in, and even modify what each party is saying. Man-in-the-middle attacks enable eavesdropping between people, clients and servers. This can include HTTPS connections to websites, other SSL/TLS connections, Wi-Fi networks connections and more.