Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Credentials And Control Go Bye, Bye, Bye with AsyncRAT: What You Need to Know

Introduced in 2019, AsyncRAT is classified as a remote access trojan (RAT) that primarily functions as a tool for stealing credentials and loading various malware, including ransomware. This RAT boasts botnet capabilities and features a command and control (C2) interface, granting operators the ability to manipulate infected hosts from a remote location.

Beyond Bullet Holes: Unveiling Cybersecurity's Hidden Risk Exposures

The art of risk assessment has long been a crucial element of military strategy and decision-making – and it remains critical to today’s best practices in cybersecurity defense. Abraham Wald, a mathematical genius, played a pivotal role in revolutionizing the understanding of hidden risk and exposure with his innovative work on aircraft survivability. During World War II, the US air force wanted effective methods to protect aircraft against enemy fire.

Snapchat Scams and How to Avoid Them

Snapchat is a mobile-based social media platform owned by Snap Inc.; it is a global platform, hosting over 734.8 million users, the majority of which are Gen Z. The platform began as a resource for sharing pictures between friends but has evolved to include options for creator content, group conversations, and the sharing of media. As Snapchat’s audience continues to grow, so too, do the threats those members face.

Manage Auditing and Security Log Configuration

Security logging and auditing in a Windows environment refers to the process of systematically recording events and activities that occur within the operating system. These audit records are stored in the security log, a component of the Windows Event Viewer. Manage auditing and security log setting grants specific users or groups the authority to configure auditing policies and manage security logs.

Dallas AI and Protecto.ai Announce Partnership

Protecto.ai alongside Dallas AI, the leading AI professional group in the Dallas-Fort Worth area, are excited to announce a partnership where Protecto will become an annual sponsor of Dallas AI. This collaboration aims to accelerate the development of secure and ethical AI technologies, while providing robust support to the local developer community through education, resources, and networking opportunities.

How to secure PHI with an identity governance solution

Cyberattacks pose a growing threat across all industries, but healthcare is especially vulnerable. In 2023, hacking incidents in the healthcare sector accounted for 79.7% of data breaches. While patients, providers, and policymakers all have a stake in protecting health information, a critical weak point lies with the technology companies that offer electronic health record (EHR) systems. These systems hold a treasure trove of PHI, making them prime targets for cybercriminals.

Aikido lands $17M Series A to bring it's 'no BS' security platform for developers to SMEs world-wide

Ghent-based Aikido, the get-it-done security platform for developers and SMEs, has raised $17M in fresh Series A funds from Singular.vc, joined by Notion Capital and Connect Ventures. The round comes a mere 6 months after Aikido raised $5.3M seed funding, making Aikido the fastest capitalized startup in Belgian history. The funds will be used to expand the platform and push Aikido onto the international stage to make security simple for SMEs and doable for developers.

Accelerating the Future of Trust for the Enterprise: Vanta Supercharges Trust Centers with Questionnaire Automation and Vanta AI

Leveraging AI and automation to help enterprises build customer trust and close deals faster. New enterprise-grade capabilities empower large organizations to demonstrate trust at scale. Vanta to debut new offerings at RSA Conference May 6 - 9 in San Francisco.

Privacy vs. Mobile Security: Why You Don't Have to Choose

When it comes to how employees get work done, personal devices are an ever-growing part of the equation. The 2023 Lookout State of Remote Work Security Report found that 92% of remote workers have performed work tasks on their personal mobile devices. While putting security controls on employer-owned devices is a no-brainer, the increasing overlap of personal with professional means that organizations need to think about how to secure employee-owned devices that are being used for work.