Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

Connect any app to Vanta with Private Integrations

We’re thrilled to announce the launch of Private Integrations today, enabling Vanta customers to easily connect their in-house or third-party applications to Vanta’s Trust Management platform. With Private Integrations, in-house systems that need compliance controls can now be managed with the same level of automation as any third-party application available in Vanta’s integration directory.

Phony Browser Updates Deliver NetSupport Trojan Using Social Engineering Tactics

A new social engineering campaign tracked as “FakeSG” is distributing the NetSupport remote access Trojan (RAT) via phony browser updates, according to researchers at Malwarebytes. The campaign is similar but distinct from the widespread “SocGholish” campaign, which also uses fake browser updates to deliver NetSupport.

Here's how External Attack Surface Management and Penetration Testing compare

“How does Detectify’s External Attack Surface Management platform compare to Penetration testing” or “What I’m really looking for is Penetration testing” are two statements we often hear when talking to prospects. We know that many of you are keen to understand how EASM compares with Penetration testing (Pen testing), so we’re exploring these two methodologies side-by-side.

Featured Post

Challenges in Securing Cloud Workloads

Cloud computing is nothing new in 2023, but is certainly still a growth piece of technology infrastructure, and one upon which many organisations work to build their IT infrastructure, whether across one cloud provider such as the market leaders AWS, or, increasingly, around a multi-cloud strategy across several providers, and some public cloud offerings.
Featured Post

The Zero-Trust Journey Every Organisation Must Make

Over the past decade, the working world has undergone a dramatic transformation. Spending each day of the week in an office is no more for most, while many have the flexibility to work from any location using a device and network that the organisation often has no control over. Productivity levels have certainly increased because of the flexible working environment, but it has opened the door to new challenges, mainly protecting the organisation's critical assets.

Twitter Hack: Joseph O'Connor Jailed for Celebrity Cyber Attack

In 2017, Joseph O'Connor was charged with the crime of using his computer to hack into the Twitter accounts of multiple celebrities. Using a phishing attack, he was able to gain access to sensitive information and post messages without the celebrity's permission. This included posts that contained links to malicious software and webpages containing viruses. He also used his access to send malicious messages in the names of celebrities, as well as posting defamatory content about them.

BoxyHQ + Cerbos: Merging SSO and Authorization

In this article, we will see how to enable Enterprise SSO login (based on the SAML single sign-on protocol) using Okta for your Next.js app and relay role-based access directly from the Identity Provider to Cerbos. We'll be using BoxyHQ's open-source Enterprise SSO solution (called SAML Jackson) to interface with Okta. We'll use the principle of minimal UI and include only the necessary interface in our example application.

Immutable vs. Mutable Backups: Does it Really Matter?

As the fight against ransomware continues, the value of data cannot be understated. Considering what a breach could cost and how long it would take to rectify, it’s no wonder risk mitigation and response is at the forefront of every IT leader’s mind. When discussing data storage, data permanence is often discussed as a way to retain information indefinitely. But when it comes to the threat of ransomware, does the immutability of your backups play such an important role?