Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Unmasking Malicious APKs: Android Malware Blending Click Fraud and Credential Theft

Malicious APKs (Android Package Kit files) continue to serve as one of the most persistent and adaptable delivery mechanisms in mobile threat campaigns. Threat actors routinely exploit social engineering and off-market distribution to bypass conventional security controls and capitalize on user trust to steal a variety of data, such as log in credentials.

Trustwave MDR Accelerates Automotive Company's Cybersecurity Posture

For many organizations, especially those in industries like automotive manufacturing, navigating escalating cyber threats and meeting stringent insurance requirements is no simple endeavor. This is where a robust solution like Trustwave Managed Detection and Response (MDR) can make all the difference.

Secure Employee Offboarding with Workday Integration

The offboarding phase is a critical time to manage risk and protect sensitive data. With the new Workday integration, departing users are automatically added to a designated Active Directory group. Falcon Identity Protection and Falcon Data Protection then apply real-time controls to block unauthorized access and prevent data exfiltration—watch the demo to see it in action!

Why Keeping Old Software Is a Security Risk #cybersecurity #appsec

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Thousands of WordPress Sites at Risk After Gravity Forms Breach

A critical vulnerability in the popular Gravity Forms WordPress plugin has led to widespread malware injections across thousands of sites. The flaw is being actively exploited by threat actors, some of whom are inserting backdoors and malicious JavaScript into WordPress sites to carry out data theft, SEO poisoning, and client-side attacks.