Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Arctic Wolf Hailed as a Leader for Innovation, Culture and Business Growth by Prestigious National Awards

Exciting times are here at Arctic Wolf. This week, we celebrated a pair of awards recognizing our status as an industry innovator and employer of choice, with rankings on both the Forbes Cloud 100 and Fortune Best Medium Workplaces list.

Abusing Google Sites and Microsoft Azure for Crypto Phishing

Throughout 2022, Netskope Threat Labs found that attackers have been creating phishing pages in Google Sites and Microsoft Azure Web App to steal cryptocurrency wallets and accounts from Coinbase, MetaMask, Kraken, and Gemini. These phishing pages are linked from the comment sections of other websites, where the attacker adds multiple links to the phishing pages, likely to boost SEO and drive victims directly to these pages.

Cyber Threats - The New Norm in Data Security

These are some of the opening words in the new survey published by ISMG and HelpSystems in the ‘Data Security Survey 2022’. The survey explores how COVID19 has permanently changed how CISOs approach Data Security. It is an important study because it recognises that in a world which is in a rush to return to ‘normal’ (whatever normal is now), change has come, and we need to respond to it.

5 Common Cybersecurity Mistakes You Can Easily Prevent

A comprehensive organizational strategy and robust company security policy are crucial for effective cybersecurity. A company needs to make a concerted effort to design, execute, and follow through with a plan to deal with cyber-risk management from top to bottom. There is no one-size-fits-all strategy for the needs of enterprises in managing cyber risk. But in order to maintain strong system security in the face of constant threats, there are some core principles that every company should follow.

No Service Is Safe - Atlassian Demands Increasing

This year, Cyberint Research Team has witnessed a major spike in compromised Atlassian service credentials compared to 2021. When observing compromised Atlassian credentials from the start of 2021 and 2022 through to August of the relevant year, we have seen an increase of around 337% (Figure 1, 2) in leaked credentials.

5 Misconceptions About Penetration Testing for Mobile Apps

People these days use mobile apps for everything from ordering groceries and medicines to paying loan EMIs and sending or receiving money. While it sounds convenient, users' private info, such as email, home address, bank details, etc., is always at risk of being stolen. Therefore, it becomes the duty of app development companies to take up stringent measures to ensure complete security for their users. And that's when penetration testing comes into the picture.

How to Reduce Your Cybersecurity Insurance Premium in 2022

Cyberattacks are growing in prevalence and sophistication, and so are the damage costs associated with these events. According to a 2022 cost of data breach report, the average damage cost of a data breach has reached a record high of USD 4.35 million. Provoked by increased data breach damage costs, a growing number of US businesses are partnering with Cybersecurity Insurers, who, in turn, respond to this increased demand by inflating cyber insurance premiums.