Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

December Cyber Roundup

During the last week of December, a threat actor who goes by the name “Ryushi”, claimed to be selling public and private data of 400 million Twitter users, which was scrapped in 2021, using an API vulnerability which was fixed by Twitter in 2022. Since then, Ireland’s Data Protection Commission (DPC) notified that it "will examine Twitter's compliance with data-protection law in relation to that security issue".

ABN AMRO Issues First Digital Bond with Fireblocks

ABN AMRO, headquartered in Amsterdam, became the first bank in Europe to register a digital bond on the public blockchain, using Fireblocks. The digital bond was issued to a select group of investors to raise funds on behalf of APOC, an ABN AMRO commercial client in the aerospace industry. ABN AMRO’s bond issuance sets an innovative precedent in bringing more real world use cases of blockchain technology to traditional financial markets.

Essential endpoint security strategies for IT admins

When it comes to endpoint security, any oversight could allow a threat actor to penetrate your organization with ease. While your IT admins focus on bolstering endpoint network security, a threat actor focuses on finding any loopholes, making it all the more difficult to stay protected. Moreover, for every corner cut on security to improve productivity, the attack surface grows. Keeping your organization's network safe all comes down to planning and executing a proper security framework.

SANS CyberThreat: An Inside Track on Europe's Premier Cyber Security Conference

In January the eyes of the global cyber security community will turn to London as the CyberThreat conference gets under way. First launched in 2018, the event is a highlight in the cybersecurity calendar and a must-attend for cyber security intelligence professionals. Nowhere else can attendees get such a breadth and depth of insight and experience on the cyber security trends sweeping the world - whether that's from the teams at NCSC, ENISA, the Bank of England or one of the many individual security experts gracing the agenda.

CISA publishes SCuBA's security configuration baseline tool for Microsoft 365

It is a no brainer that cloud adoption has surged exponentially in the last couple of years. The rise of digitization and DevOps combined with the aftermath of the pandemic has made cloud computing a critical ingredient for any organization’s growth. Gartner® predicts that by 2025, more than 95% of digital workloads will be deployed on cloud-native platforms.

7 AWS Security Tools for 2023

AWS (Amazon Web Services) allows businesses to quickly and securely build and scale applications. Hence, there is exponential growth in AWS usage among businesses and organizations. For example, As of 2020, AWS held 76% of enterprise cloud usage, reflecting the power and importance AWS holds. This increased use of AWS tools and services opens new doors for cyber attackers. However, AWS is a very reliable cloud service provider that works hard to ensure protection over its infrastructure.

What is Malware? Definition, Types, & Prevention

Malware is short for "malicious software" and refers to any software program that is designed to harm or exploit a computer or device. And unfortunately, malware is all over the internet, with 560,000 new pieces of malicious software detected every day. It can come from many potential sources, including: It’s vital for organizations to understand the risks malware poses and take effective measures to stop potential threats.

How to make your MSP business attractive to buyers

MSPs are becoming critically important. The difficulty of finding security specialists and the high costs of managing their own security have led medium-sized companies to hire MSPs to keep their digital security up to date while they focus on their business. Growth in the MSP market means buyers are now showing interest. We are frequently seeing large and small MSPs being acquired by other larger managed services companies or private equity firms.

Defender to Defender: Voice of the Customer Webinar with Sysdig

As more companies move their operations from on-prem to the cloud, they are turning to Sysdig which provides tools to secure containers, Kubernetes, and cloud services. The Sysdig Threat Research Team, which now numbers close to 20 threat research engineers, includes computer security and machine learning experts from around the world.