Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Part 1: How Egnyte Built its Turnkey Retrieval Augmented Generation Solution

The Egnyte platform houses a lot of data. To enable users to make the most of this asset, we need to help them efficiently retrieve information. Traditional search interfaces do a decent job of retrieving information directly related to query keywords, often presenting results in a list format without additional interpretation or synthesis.

Phishing and Pretexting Dominate Social Engineering-Related Data Breaches

New data shows that despite the massive evolution of the cybercrime economy, threat actors are sticking with the basics in social engineering attacks, with a goal at stealing data. I probably could have called this purely based on all the articles I’ve written (and all the articles I’ve read that never made it here). But when it comes to protecting your organization from social engineering, stick to the basics.

FBI Warns of AI-Assisted Phishing Campaigns

The US Federal Bureau of Investigation’s (FBI’s) San Francisco division warns that threat actors are increasingly using AI tools to improve their social engineering attacks. “AI provides augmented and enhanced capabilities to schemes that attackers already use and increases cyber-attack speed, scale, and automation,” the FBI says.

SenseOn achieves 99% protection rate and 0 false positives in the latest AV-Comparatives Real-World Protection Test

SenseOn achieves 99% protection rate and 0 false positives in the latest AV-Comparatives Real-World Protection Test False positive alerts in security operations pose a significant risk by diverting critical resources and attention away from genuine threats. These incorrect alarms, which signal threats where none exist, can lead to wasted time, reduced efficiency, and increased costs as security teams investigate and address these non-issues.

Offensive Security Services: How to Improve Security by Thinking Like an Adversary

Taking a proactive approach to cybersecurity is essential for safeguarding sensitive data and systems from potential threats. By adopting an offensive security strategy, organizations can identify and mitigate vulnerabilities and risks before they are exploited by malicious actors.

Falcon Fusion SOAR and Machine Learning-based Detections Automate Data Protection Workflows

Time is of the essence when it comes to protecting your data, and often, teams are sifting through hundreds or thousands of alerts to try to pinpoint truly malicious user behavior. Manual triage and response takes up valuable resources, so machine learning can help busy teams prioritize what to tackle first and determine what warrants further investigation.

How Cybersecurity Financial Quantification Helps CISOs Make Their Case to the Board

More enterprise business leaders are beginning to understand that cybersecurity risk equates to business risk—and getting a clearer sense of the impact that cyber exposures can have on the bottom line. Consider the MGM Resorts and Clorox Company cybersecurity incidents that occurred last year. Both suffered considerable attacks, reportedly led by the Scattered Spider cybercriminal group, causing widespread business disruption and substantial financial losses.

Symmetric vs. asymmetric encryption: Practical Python examples

Symmetric and asymmetric encryption are the two most common ways to protect sensitive data with cryptography. These methods use key(s) to transform an unencrypted message into an encrypted message (a ciphertext) that is extremely difficult to decrypt without the correct key(s). Symmetric encryption uses a single key to encrypt and decrypt data. In contrast, asymmetric encryption uses a pair of keys, a public and private key, to encrypt and decrypt sensitive data.