Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

FBI & DHS Issue Warning: RDP Attacks are on the Rise

The FBI & DHS issued a joint statement alerting businesses and consumers that cybercriminals are increasingly exploiting the Remote Desktop Protocol (RDP) administration tool. The notice states that using RDP as an attack vector has been on the rise since 2016, with attackers using open RDP ports to hijack machines or intercepting RDP sessions and infecting the system being remotely accessed with different types of malware.

Sales Play Book - Value Proposition

Today’s email attacks (ransomware, business email compromise, and sandbox evasion) have evolved, and are outpacing the tools developed to combat them. While they may help with some aspects of email security or stop some attacks, they don’t solve the whole problem and attacks need only succeed once to seriously harm people, data, and brands. Partial security is not security.

The Netacea Virtual Waiting Room

Netacea’s Virtual Waiting Room is a cloud-based service that sits in front of your website, mobile app and APIs, controlling the flow of visitors. Guarantee a positive customer omni-channel experience even under extreme conditions such as Black Friday. The use of online services has revolutionised the way we consume everything every day, which has made life great! What’s not so great though is when these services cannot meet the consumer demand that they generate, and then become unavailable.

Facebook Urged to Provide Breach Details to UK Regulators Swiftly

European regulators are awaiting details from Facebook regarding last week’s data breach involving an estimated 50 million Facebook users. Last week, Facebook notified the public that three vulnerabilities found within its video uploader tool allowed hackers to exploit access tokens belonging to 50 million user accounts.

Observability and Visibility in DevSecOps

Companies often turn to software as a solution when they need to solve a problem. Whether it’s to automate or enhance a task, or gain valuable information in an easily consumable fashion. The same is true for security teams on both sides of the red and blue line. Security professionals build tools to automate exploitation, detect attacks, or process large amounts of data into a usable form.

Ransomware - The Great White Shark of Malware

Right now, Ransomware is the Great White Shark of cyber-attacks, the most feared malware of all, and both corporate and home users are running scared. And rightly so - Anyone who has had experience with Ransomware, will attest to the agony and disruption. But instead of worrying about an attack, what action can be taken to safely venture back into the water and not necessarily "with a bigger Boat"?