Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

MDR firm saves $100K per year with LimaCharlie

Recon Infosec is a growing managed security services provider run by a team of seasoned cybersecurity experts. After switching from their custom-engineered security stack to the LimaCharlie SecOps Cloud Platform, they achieved an annual cost savings of $100,000, improved their mean detection and response times by 98%, and laid the groundwork for scalable, long-term growth.

Enhance Productivity with Egnyte for Microsoft Teams Integration

Microsoft Teams is the world’s most popular collaboration tool - used by over 300 million users globally. Its popularity stems from its breadth of collaboration capabilities, including instant chat, conversational channels, online meetings, and video calls. However, the sheer volume of content generated by these collaboration workflows can quickly lead to content management challenges.

Bad Actor Uses Fake Android Chat to Install Malware

Researchers at CYFIRMA warn that the Bahamut threat actor is using a malicious Android app to deliver malware. “The suspected Android malware, known initially as ‘CoverIm’ was delivered to victims via WhatsApp, and was found to be disguised as a dummy chatting application named ‘SafeChat,’” the researchers write.

KnowBe4 Chooses Drata as Our Exclusive GRC Partner

Drata is KnowBe4’s preferred compliance automation platform for KnowBe4 customers. We have some big news. KnowBe4 has selected Drata as our exclusive GRC partner. What does that mean? As we transition KnowBe4 Compliance Manager (KCM) offering to a support-only model, we are encouraging all our current users to migrate to Drata for their compliance automation needs. After an exhaustive assessment of vendors in the market, we chose Drata for a few reasons. Here's what made Drata different.

Honeypot Recon: New Variant of SkidMap Targeting Redis

Since Redis is becoming increasingly popular around the world, we decided to investigate attacks on the Redis instance. We didn’t have to wait long for the first results of the Honeypot. The trap caught an activity about which the Western world does not hear too often while analyzing SkidMap. More importantly, this variant turned out to be a new, improved, dangerous variation of the malware. Its level of sophistication surprised us quite a bit.

5 ways to prevent phishing from ruining your summer vacation

During the summer months, when employees and customers are away on vacation, things usually slow down for businesses. But for cybercriminals, the opposite is true because they are busy taking advantage of minimal staffing levels in companies during the vacation period to launch complex attacks. The U.S. Federal Cybersecurity and Infrastructure Security Agency (CISA), warns that the risk of being hit by a cyberattacks rises over the holidays and summer vacation-themed phishing attacks gain momentum.

Server Security: What it is and How to Implement It

Your business runs on servers. Without your DNS server, your users wouldn’t be able to connect to online resources. Without your proxy servers, your local networks would be visible across the public internet. Without your database servers, your organization wouldn’t be able to execute the queries that enable them to make data-driven decisions. Since servers are critical to business operations, threat actors value them.

How To Prevent Your Instagram from Getting Hacked

Unfortunately, Instagram is a common target for malicious hackers. Cybercriminals hack accounts in order to distribute spam, commit phishing attacks against your followers and steal your data. There were more than 1 million social media account takeovers in 2022, and most of the affected accounts were on Instagram.

2023 Global Cloud Threat Report: Cloud Attacks are Lightning Fast

The second annual threat report from the Sysdig Threat Research Team (Sysdig TRT) is packed with their findings and analysis of some of the hottest and most important cybersecurity topics this year. Threat actors are really embracing the cloud and are using it to their advantage to evade detection and speed up their attacks.