Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Microsoft Encrypted Restricted Permission Messages Deliver Phishing

Over the past few days, we have seen phishing attacks that use a combination of compromised Microsoft 365 accounts and.rpmsg encrypted emails to deliver the phishing message. At this stage, we are exploring and uncovering different aspects of this campaign and will share here some of our observations to date.

The JFrog Platform Delivered 393% ROI

I’m excited to share the findings of a Forrester Consulting Total Economic Impact™ (TEI) study, a recently commissioned study conducted by Forrester Consulting on behalf of JFrog, which examines the potential return on investment (ROI) that organizations may realize by deploying the JFrog Software Supply Chain Platform. Software has become the critical infrastructure of our daily lives.

AI on offense: Can ChatGPT be used for cyberattacks?

Generative AI models have a long history in artificial intelligence (AI). It all started back in the 1950s with Hidden Markov Models and Gaussian Mixture Models, and it really evolved with the advent of Deep Learning. In the past five years alone, we have gone from models with several millions of parameters to the latest being GPT-4, estimated to have over 100 trillion parameters.

More than 10k IRA Holders Exposed in Retirement Clearinghouse Breach

Retirement Clearinghouse is a financial services company that got its start in 2001 by the name of RolloverSystems first. This company helps businesses enable their employees to exchange their individual retirement savings accounts for company 401k accounts. This service helps keep employees more financially secure and results in better long-term retirement savings.

Unraveling the State of Kubernetes Security in 2023

ARMO addresses 76% of key concerns highlighted in the Red Hat 2023 Report. We analyzed one of our favorite annual reports – the Red Hat State of Kubernetes security report 2023. It’s chock full of really interesting data on one of our favorite topics: Kubernetes security! (Who knew?!) In this post we’re going to unpack some of the most compelling data points, and compare them to previous years.

Optimized Kubernetes cluster architecture: considerations and best practices

Kubernetes is a powerful platform for managing containerized applications at scale, but configuring a Kubernetes cluster can be complex and challenging. In this post, we’ll explore various key considerations for optimizing a Kubernetes cluster, including different cluster, node, and tenancy configurations. Kubernetes is a powerful platform for managing containerized applications at scale, but configuring a Kubernetes cluster can be complex and challenging.

Data loss prevention for developers

A security violation in the form of a data breach can create costly damage to a company's reputation. But what exactly is a data breach? The European Commission has divided data breaches into three distinct categories — confidentiality breaches, integrity breaches, and availability breaches: In this article, you'll learn more about what a data breach is and how you can prevent data breaches when designing and developing your software.

Mergers don't have to be a nightmare for IT teams

When it comes to merger and acquisition activity – 2023 is poised to be an active year despite uncertain macroeconomic conditions. As always, financial due diligence will be the cornerstone of successful M&A endeavors. Unfortunately for IT teams, there’s no similar process for scrutinizing the network.

Best Practices for Managing Patient Data Privacy and Security

Patient data privacy is of utmost importance in today’s healthcare environment. Security is equally critical, forming the foundation of trust between patients and providers. Healthcare organizations handle incredibly sensitive information, including medical histories, diagnoses, and treatment plans. Mishandling this data carries significant risks far beyond just financial implications. These threats come in the form of significant monetary fines under some regulations.