Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What's New with Keeper | April 2025

KeeperPAM enables organizations to achieve complete visibility, security, control and reporting across every user on every device. KeeperPAM is cloud-based, enables zero-trust and zero-knowledge security, and helps your organization meet compliance mandates by unifying four integral solutions into one unified platform and control plane – enterprise password management, secrets management, connection management, zero-trust network access and remote browser isolation.

How to Install the NAKIVO Solution as a VMware Virtual Appliance

You can choose to deploy the NAKIVO solution on physical Windows and Linux machines, virtual machines as a virtual appliance, NAS devices. The NAKIVO Backup & Replication preconfigured virtual appliances (VA) are available for both VMware vSphere and Nutanix AHV as well as for Amazon EC2 environments (as an AMI).

The Growing Threat of Ransomware-as-a-Service (RaaS) on Healthcare Infrastructure

According to the 2024 State of Ransomware report by Sophos, there was a 500% increase in ransom bills in the last 12 months. Moreover, an analysis by Comparitech revealed 181 confirmed ransomware incidents targeting healthcare providers in 2024, with 25.6 million records compromised. Meanwhile, there were 42 more confirmed attacks on healthcare organizations not involved in direct care provision. These additional attacks amounted to over 115 million compromised records.

World Password Day: The Hidden Cost of Compromised Credentials

Every year, World Password Day highlights the importance of strong credentials and password managers. But the real issue today isn't whether your password is complex enough—it's whether it's already been stolen and is for sale on the dark web. Millions of credentials are circulating in underground marketplaces like e-commerce platforms, complete with verified vendors, customer support, and full database access.

A Sneaky T-Mobile Scam and Lessons That Were Learned

A friend of mine got a call on his phone and he regrettably picked it up. The number was 267-332-3644. The area code is from Bucks County, PA, where he used to live many years ago. But since his multiple anti-scam phone filter apps did not flag the number as a scam, and it was from a place he used to live, he picked it up.

Edge exploits, EDR blind spots, 51-second breakouts

For every advancement in defense, attackers supply the equal and opposite adaptation. In the last few years EDRs have become so effective that adversaries have radically shifted gears. That shift shows up unmistakably in three heavyweight reports—Verizon’s DBIR, Mandiant’s M-Trends, and CrowdStrike’s Global Threat Report. Here’s how I’m stitching their data together.

Ransomware Inc: Decoding the RaaS Business Model

When you hear the word “ransomware,” many people think of a lone hacker launching a complex cyberattack. However, ransomware attacks that paralyze businesses worldwide have evolved into the product of a highly organized, industrialized criminal ecosystem. Their secret weapon? Ransomware-as-a-Service, or RaaS.

Top 5 HIPAA Pitfalls That Lead to PHI Leaks on Websites

Maintaining HIPAA compliance on healthcare websites is crucial for protecting PHI (Protected Health Information) and upholding patient privacy. The Health Insurance Portability and Accountability Act (often referred to in short form as HIPAA or the portability and accounting act) was introduced in the United States to address the health insurance portability, security, and accountability requirements within the healthcare industry.

Securing Websites Against XSS Attacks: Must-Know for Developers and Site Owners

Cross Site Scripting (XSS) is a very serious kind of security issue saying that they target websites as well as the users who are using them. To put it simply, XSS attacks means that a hacker was able to inject malicious scripts into a website. These scripts would then run in the user's browser, many a time without the user knowing about it. Most commonly, these attacks are aimed at stealing some sensitive information, impersonating the user, or just playing around with how the website looks or behaves.

Best Practices for Using ionCube Encoder in CI/CD Pipelines

With the growing adoption of automated build pipelines, the ionCube Encoder CI Edition offers a tailored solution for developers needing flexible, temporary machine licensing within their CI/CD workflows. The CI Edition is ideal for use in ephemeral environments like Docker containers or cloud-based runners, allowing encoding operations to occur seamlessly as part of your integration process. If you’re not yet familiar with this product, our FAQ entry provides a concise overview.