Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Ransomware Inc: Decoding the RaaS Business Model

When you hear the word “ransomware,” many people think of a lone hacker launching a complex cyberattack. However, ransomware attacks that paralyze businesses worldwide have evolved into the product of a highly organized, industrialized criminal ecosystem. Their secret weapon? Ransomware-as-a-Service, or RaaS.

Top 5 HIPAA Pitfalls That Lead to PHI Leaks on Websites

Maintaining HIPAA compliance on healthcare websites is crucial for protecting PHI (Protected Health Information) and upholding patient privacy. The Health Insurance Portability and Accountability Act (often referred to in short form as HIPAA or the portability and accounting act) was introduced in the United States to address the health insurance portability, security, and accountability requirements within the healthcare industry.

Securing Websites Against XSS Attacks: Must-Know for Developers and Site Owners

Cross Site Scripting (XSS) is a very serious kind of security issue saying that they target websites as well as the users who are using them. To put it simply, XSS attacks means that a hacker was able to inject malicious scripts into a website. These scripts would then run in the user's browser, many a time without the user knowing about it. Most commonly, these attacks are aimed at stealing some sensitive information, impersonating the user, or just playing around with how the website looks or behaves.

Best Practices for Using ionCube Encoder in CI/CD Pipelines

With the growing adoption of automated build pipelines, the ionCube Encoder CI Edition offers a tailored solution for developers needing flexible, temporary machine licensing within their CI/CD workflows. The CI Edition is ideal for use in ephemeral environments like Docker containers or cloud-based runners, allowing encoding operations to occur seamlessly as part of your integration process. If you’re not yet familiar with this product, our FAQ entry provides a concise overview.

Root Cause Collaboration - Tanium Investigate - Tanium Tech Talks #125

Whether you are in IT operations or security, collaborating to close cases is a daily event. Tanium Investigate helps you get to root cause faster by collecting data points across endpoints, users, and teams. Get to root cause faster Reduce Mean-Time-To-Resolution MTTR Correlate artifacts across endpoints and users Reach endpoints anywhere in the world Integrate with ServiceNow ticketing Live process monitor (and kill processes) Browse the file system and tail log files Manage Windows services Browse Windows Event Logs Browse Windows Registry.

EP 6 - Incident Response POV: 2025 Emerging Threats

In this episode of Security Matters, host David Puner, dives into the world of evolving cyberthreats with Bryan Murphy, Senior Director of CyberArk's Incident Response Team. Imagine a scenario where an attacker uses AI-generated deepfakes to impersonate your company's VP of finance, gaining unauthorized access to your environment. Bryan Murphy shares insights on how these sophisticated attacks are turning identity into the attack surface and why your first line of defense might be as simple as a video call.

Security Gone Mad: The Fine Art of Overdoing It

Cybersecurity or overkill? In this brilliantly unfiltered episode of Razorwire, James Rees is joined by security experts Iain Pye and Chris Dawson to debate when security controls cross the line from protection to pointless. From biometric data dilemmas to airport security absurdities, they dissect where cybersecurity goes wrong — and how to strike the right balance.