Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How external attack surface analysis enhances pen testing

Despite advancements in security, web applications are still a problem. Attackers target web applications because they’re exposed, complex, and not as well protected as they should be. According to Verizon1, web applications are the most prevalent attack vector, with exploitations of vulnerabilities increasing by 180% in 2024.

A Complete Guide to EC2 Instance Backup: AWS Snapshots vs. AMIs

Amazon Web Services (AWS) provides two native options that can be used to back up AWS EC2 instances – AWS EBS Snapshots and Amazon Machine Images (AMIs). This blog post explains the differences between these two approaches to backup and explains when each method is optimal. NAKIVO for AWS EC2 Backup Backup of Amazon EC2 instances to EC2, AWS S3 and onsite. Anti-ransomware options. Fast recovery of instances and application objects. DISCOVER SOLUTION.

A Sting on Bing: Bumblebee delivered through Bing SEO poisoning campaign

Bumblebee is a downloader malware which has become known for its sophistication and effectiveness. The malware was first discovered in 2022 and was believed to be a tool for ransomware groups due to the developer’s close ties with Conti. Since then, it has been used in various attacks and has been delivered through multiple methods, including phishing emails, malicious documents, and SEO poisoning.

Amazon SES monitoring: Detect phishing campaigns in the cloud

Amazon Simple Email Service (Amazon SES) is a cloud-based provider for sending transactional, marketing, and newsletter emails. Because of its role as a source of communication for organizations, Amazon SES has become a primary tool for phishing campaigns. Our latest threat roundup includes a key finding that Amazon SES is a common target in the initial stages of a cloud control plane attack.

RVTools Supply Chain Attack Delivers Bumblebee Malware

Arctic Wolf has recently observed the distribution of a trojanized RVTools installer via a malicious typosquatted domain. The domain matches the legitimate domain, however, the Top Level Domain (TLD) is changed from.com to.org. RVTools is a widely used VMware utility for inventory and configuration reporting, developed by Robware. Once the malicious installer was downloaded, the installer attempts to make outbound connections to known command and control infrastructure.

Must-Have Fintech Security Tools for CTOs

Fintech CTOs aren’t short on tools; they’re short on the right ones. Between fast-moving DevOps pipelines, open banking integrations, and cloud-native architectures, security often lags behind innovation, not due to negligence, but because traditional tooling fails to keep up. Modern fintech threats like API abuse, IAM misconfigurations, and privilege escalations don’t wait for quarterly audits. They exploit real-time gaps between development and security operations.

Nessus Vulnerability Scanner: Capabilities, Workflows, and Limitations

For many cybersecurity teams, Nessus is the scanner they started with; a reliable, battle-tested tool that’s been part of the security stack for over two decades. Backed by Tenable’s extensive vulnerability database, Nessus is known for its accuracy in identifying known CVEs and misconfigurations across networks and systems. But while environments have evolved from on-prem to multi-cloud, from VMs to containers, Nessus has primarily stayed the same.

CrowdStrike 2025 Latin America Threat Landscape Report: A Deep Dive into an Evolving Region

Latin America has quickly become a hotspot for cyber activity. The region’s rapid digitalization, expanding cloud adoption, and evolving geopolitical friction have drawn the attention of both financially motivated eCrime actors and strategic nation-state adversaries. The CrowdStrike 2025 Latin America Threat Landscape Report provides key insights into cyber activity across Central and South America, Mexico, and the Caribbean.

Faster Fixes: Solving the Security Testing Trade-off

Pen testers use active testing technologies to probe and analyze systems dynamically, just as an attacker does. Active testing confirms whether a vulnerability is actually exploitable, which security teams use to determine which vulnerabilities to prioritize for remediation. Active security testing delivers confidence, sorely needed in today’s IT security world where noise and false positives have become a major part of an analyst’s day.

Minimize Cybersecurity Threats by Making Smart Hosting Choices

Avoid hosts with vague policies, poor support, or unrealistically low prices, as these can signal serious security gaps. When you think about protecting your website from cyber threats, your first thought probably isn’t your hosting provider. The typical go-to solutions are firewalls, strong passwords, and two-factor authentication. But the truth is, your hosting environment is one of the most overlooked yet critical components of a strong cybersecurity strategy.