Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

The four most important aspects of software due diligence audits

Understanding the key aspects of software due diligence audits will help you know what to look for in a trusted M&A partner. At some level, the pitch for any software-related service is the same: We have the expertise to provide high-quality solutions to your challenging problems. Sometimes that expertise is “powered by” proprietary technology. That’s well-aligned to what prospective clients look for in most software service scenarios.

Analysis of Clop's Attack on South Staffordshire Water - UK

On August 15, the Clop ransomware group announced on their leak website the breach of South Staffordshire Water, a privately owned UK water supply company. This attack is yet another example of ransomware gangs targeting critical infrastructure expecting to receive a big payout, which is reminiscent of hundreds of previous incidents, including the well-known Colonial Pipeline and JBS attacks.

5 Common Risks Involved in Mergers and Acquisitions

The total global value of corporate mergers and acquisitions (M&A) reached $5.9 trillion in 2021. For 2022, the figure is expected to reach $4.7 trillion. This would make 2022 the second-best year on record for the M&A market after 2021. Clearly, robust M&A opportunities exist for companies looking to stimulate growth, increase market share, and influence supply chains. Despite those potential benefits, however, M&A deals are also fraught with serious risks.

How to Share Passwords and MFA Codes with Employees

Organizations should implement consistent cybersecurity practices to protect their businesses and employees. Password sharing is a common but risky practice in many workplaces that can leave companies vulnerable to a data breach. Sharing passwords is sometimes unavoidable in the workplace, since many businesses often need multiple employees to access a single user account.

Facial Recognition Technology: CBP's new Traveler Identity Verification

With an urgent need for the deployment of a new biometric and biographic authenticator at the borders, US officials in departments such as the Department of Homeland Security (DHS), U.S. Customs and Border Protection (CBP) decided to use a Facial Recognition Technology over their Manual ID or Document Verification techniques.

Mining Malware History for Clues on Malicious Package Innovation

Malware has come a long way since it first made the scene in the late 1990s, with news of viruses infecting random personal computers worldwide. These days, of course, attackers have moved beyond these humble roots. Now they deploy a variety of innovative techniques to extract large amounts of money from businesses around the world. A similar development is taking place with malware’s upstart cousin – the emergence of malicious packages being uploaded to package registries.

4 Essential Best Practices for Software Supply Chain Security

The software supply chain encompasses anything needed to develop and deliver a product, such as all the components, images, open source libraries, processes, and tools — so securing the supply chain must become a priority. Unfortunately, software supply chain attacks are one of the most pervasive threats that organizations face and they increased more than 300% in 2021, according to a study from Argon Security, part of Aqua Security.

Overview of the Cyber Weapons Used in the Ukraine - Russia War

Observing the ongoing conflict between Russia and Ukraine, we can clearly see that cyberattacks leveraging malware are an important part of modern hybrid war strategy. While conventional warfare is conducted on the battlefield and limited by several factors, cyber warfare continues in cyber space, offering the chance to infiltrate and damage targets far behind the frontlines. Russia utilized cyberattacks during the initial phase of the invasion in February.