Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Romance fraud losses rose 91% during the pandemic, claims UK's TSB bank

UK banking group TSB is calling on social networks and dating apps to better protect their users from fake profiles, following an alarming spike in romance fraud. Examining data from December 2020 - January 2022, TSB determined that romance fraud almost doubled compared to pre-pandemic levels, with a record increase in losses of 91% - averaging £6,100 per incident.

How Passwords Get Compromised

Have you ever checked on your passwords and noticed a warning that they’ve been compromised? One compromised password can put all your credentials at risk, but how does this happen? Your passwords may be showing as compromised due to a breach, poor password practices or for other reasons. Read on to learn more about compromised passwords and how you can start better securing them.

Software and AppSec Challenges and Opportunities in Banking and Fintech - Part Three

Application security is particularly important in the banking and financial technology sector, where a single breach can put large portions of sensitive information at risk. How to manage that risk is a complex process that affects how teams secure applications across their software supply chain.

Breaking Docker Named Pipes SYSTEMatically: Docker Desktop Privilege Escalation - Part 1

Everything started when I was researching Windows containers. It required installing Docker Desktop for Windows, and I couldn’t help but notice that there were many Docker processes. Since some of the processes were privileged, the communication between them is of particular interest, which led me to explore further. I found the processes were using named pipes for communication, and one of them was a way to forward API calls from a low-privileged user to a privileged service.

How to Secure Secrets in Multi-cloud Environments

It wasn’t too long ago that using a single cloud for some business operations was cutting-edge technology. Now the cloud is essential for accelerating growth, improving efficiency and remaining competitive. Most organizations have multiple cloud environments deployed, in addition to private cloud and on-premises environments. In fact, in a soon-to-release CyberArk survey, 85% of respondents said they would be using three or more cloud service providers by 2023.

Office Hours: Tapping Cloudflare for API Security

This 30-minute interactive discussion was designed specifically for Cloudflare users to learn more about API security challenges and how your existing Cloudflare environment can give you a jumpstart to solve them. Learn how API attacks are different and why industry experts are calling 2023 the year of API security.

5 Advanced DevSecOps Techniques to Try in 2023

If you’re here, you know the basic DevSecOps practices like incorporating proper encryption techniques and embracing the principle of least privilege. You may be entering the realm of advanced DevSecOps maturity, where you function as a highly efficient, collaborative team, with developers embracing secure coding and automated security testing best practices.

Netwrix: If the Breach Comes: Defend & Recover Your AD

A single improper change to an AD object can seriously damage both performance and security - so you need a solution that empowers you to quickly pinpoint and roll back those modifications. More broadly, you need to be able to spot suspicious behaviour in time to prevent costly breaches and downtime. During the webinar, we'll show you how you can.