Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Fortifying defenses: The role of corrective controls in a resilient security posture

Organizations nowadays face sophisticated threats that demand not just preventative measures but a robust strategy for detection and correction. Corrective controls are pivotal in mitigating the impact of security breaches and ensuring operational resilience. This article explores the importance of corrective controls, industry insights, and actionable strategies to help organizations build an impregnable security framework.

How Recent Executive Orders Are Reshaping Cybersecurity

To say that the actions of the Trump administration are having an impact on cybersecurity is an understatement. Executive orders are an important and useful tool that have been used by many presidents for the good of the country – and sometimes for other ends – and some recent executive orders have been aimed at establishing and improving the cybersecurity of the country. Meanwhile, others have, to put it lightly, the opposite impact.

Be the First to Receive the 2025 Trustwave Risk Radar Report: Manufacturing Sector

Trustwave is set to unveil the 2025 Trustwave Risk Radar: Manufacturing Sector - a deep dive into the most pressing cybersecurity risks facing the industry - on February 26 as part of Trustwave SpiderLabs’ multi-year research into the particularly unique set of cybersecurity threats positioned against the manufacturing sector. Pre-register now to be among the first to receive this comprehensive research plus additional deep dives and expert-led webinar overviews of the materials.

Indusface Recognized in G2's Best Indian Software Companies 2025

We are excited to share that Indusface has been named in G2’s Best Indian Software Companies 2025 list! This recognition underscores our dedication to delivering industry-leading security solutions that safeguard businesses from evolving cyber threats. Out of 2,250 vendors, only 495 companies met the stringent eligibility criteria for G2’s prestigious Best Software Awards, and we are honored to be ranked among the Top 50.

What You Need to Know about the Coast Guard Data Breach

The Coast Guard is the only branch of the United States military in the Department of Homeland Security. It enforces federal law, controls the nation’s borders and maritime Approaches, and protects the United States ports and waterways. The premier maritime law enforcement agency has about 55,000 civilian employees and military service members. Like any other military branch, the Coast Guard maintains systems that store national security intelligence and personnel records.

Mars Hydro Security Flaw Puts IoT Users at Risk

Mars Hydro is a leading Chinese brand producing a wide range of Internet of Things (IoT) devices for indoor gardening and the hydroponics industry. It specializes in designing energy-efficient LED grow lights catering to various plant growth stages, from seedling to flowering, ensuring optimal yield for users.

3 ways orchestration and automation enhance vulnerability management

When it comes to vulnerability management, time is critical - the longer a vulnerability goes unaddressed, the greater the risk. Security teams need efficient, reliable processes that don’t drain resources. For most teams, relying on human effort alone isn’t sustainable or scalable. This is why so many teams turn to workflow orchestration and automation.

Phishing Kit Abuses Open Graph to Target Social Media Users

Researchers at Cyble warn that a phishing kit is abusing the Open Graph (OG) protocol to target social media users. The Open Graph protocol, originally developed by Facebook in 2010, allows users to control the content preview that’s displayed when a link is posted on social media. The phishing kit, dubbed “OG Spoof,” abuses this feature to post malicious links that appear legitimate.

Phishing Attacks Increased by Nearly 200% in H2 2024

Phishing and malicious emails remained the primary vectors of infection during the second half of 2024, according to a new report from Acronis. “The number of email-based attacks detected in the second half of 2024 increased 197% compared to the second half of 2023, while the number of attacks per organization within the same time frame increased by 21%,” the report says.