Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

How to Create An Incident Management Playbook

When everything is going well, it's pretty easy to plan and manage routine activities in any business process. But stress kicks in when we encounter an unexpected incident that risks radically damaging the functioning of the organization. It is quite difficult to decide what step to take under intense stress. An unexpected incident that breaks through the barriers of the cybersecurity posture can cause all digital functions of the organization to stop.

4 Reasons Scan Results May Differ Over Time: Advice from an Application Security Consultant

You didn’t change anything in your code, yet the scan is different this time. Here’s advice from an Application Security Consultant on why that may be. Have you ever wondered why you scan code one day and get one result, and then scan the same code a month later and get different results – even though you never changed anything?

Video Verification- Live Identification for Video KYC

Today’s corporations are more digitized than ever before. Banks, financial institutions, and other corporations rely on remote video verification for client authentication, compliance screening and digital onboarding. It enables onboarding your customers more conveniently and helps secure the platform. With online fraud on the rise globally, businesses are highly targeted usually in the signup process.

Fostering an effective and secure remote-work model

An IDSA study found that 79% of enterprises have suffered an identity-related breach. At ManageEngine, we understand how important identities are to the overall security posture of an organization. That’s why this Identity Security Week, we’re offering a series of blogs to spread awareness about the importance of identity security and what simple measures can help improve the security of your organization. Let’s kick off the series with a trending topic—remote work.

Twitter's New Verified Badge Causes Security Issues

Over the past weeks, Elon Musk’s purchase of Twitter has drawn the attention of people worldwide, even those who are not using the platform. One of many ideas Musk had while purchasing Twitter was to allow users to pay $8 per month and receive the blue check mark. Until this decision, only verified celebrities, companies, and journalists by Twitter, received the mark and it helped fight against fraud and identity theft incidents.

How CrowdStrike Detects Cloud Storage Misconfigurations to Protect Valuable Data

Cloud storage misconfigurations continue to become more prevalent and problematic for organizations as they expand their cloud infrastructure, driving the importance of technologies such as cloud security posture management (CSPM) as crucial tools for protectors everywhere. Consider the recently reported public exposure of data associated with some Microsoft customers and prospects.

Curbing Rampant CEO Fraud in 2022

If it seems like you’re constantly hearing about cybercrime these days, there’s a reason for that. Globally, reports of cyberattack instances increased by a staggering 125% in 2021, a trend that shows no sign of slowing. As businesses and consumers turn their attention to cybercrime and protective measures, enterprising cybercriminals continue to fine-tune their approach to exploiting vulnerabilities. In fact, cybercrime is on track to become the world’s third-largest economy.

Evicting Typosquatters: How CrowdStrike Protects Against Domain Impersonations

Threat actors constantly unleash phishing attacks that use emails or text messages containing domains or URLs, all designed to impersonate well-known companies and trick users into visiting fake websites and entering their logon or other confidential information. Unfortunately, many users fall prey to such attacks, unknowingly giving threat actors access to their work or personal accounts.

Fangxiao: A Phishing Threat Actor

Do you know what “fangxiao” means in simplified Chinese? Before you Google it, let me tell you that it stands for “imitate” and this is exactly what Fangxiao phishing campaign actors try to do – imitate and exploit the reputation of international, trusted brands by promising financial or physical incentives to trick victims into further spreading the campaign through WhatsApp.

What's the Difference Between Red Teaming and Penetration Testing?

When discussing cybersecurity, “penetration testing” and “red teaming” are two terms that are often used interchangeably but are two entirely separate concepts. If you are considering implementing additional cybersecurity protocols within your organization, it’s essential to understand the unique role and function of each of these processes and how they can benefit your organization.