Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

IONIX: The State of Fortune 500 Attack Surface Threats

In our 2022 research, we discovered 148,000 critical vulnerabilities across Fortune 500 organizations. Security leaders face an onslaught of vulnerabilities. In 2021 alone, 18,378 new vulnerabilities were reported. As enterprises become increasingly hyper-connected and internet facing, the expanding attack surface is a top security concern. On Wednesday, December 7, 2022 at 1 PM ET / 10 AM PT, Cyberpion Chief Product Officer Michael Groskop will discuss our findings in detail at this Cyberpion Attack Surface Protection Series webinar.

Great Power(Shell) doesn't always come with great responsibility: Sometimes, SIEM is all you need

Fileless threats are on the rise. These threats occur when cybercriminals use pre-existing software in victims’ systems to carry out attacks, instead of using a malicious attachment or file. More often than not, a criminal’s favorite tool for a fileless attack is PowerShell.

Tips for Developing Your Ransomware Strategy

Ransomware attacks continue to make headlines and cause havoc on organizations on an international scale. Unfortunately, we should expect that ransomware attacks will persist as one of the primary threats to organizations. Ransomware attacks have grown 350% in recent years, and while the best strategy is to prevent attacks from happening in the first place, there is no guarantee your data won’t be compromised.

The Top 5 CCPA Software Solutions

The California Consumer Privacy Act (CCPA) is a law that allows California consumers to ask companies to provide them with all the information they have stored about them as well as a full list of any third parties that the company has shared that data with. In addition, the California law gives consumers the right to sue companies if the privacy guidelines are violated, even if there have been no actual breaches of privacy.

Why endpoint security and MFA should always go together

The current cyberattack landscape has forced companies to look for new forms of protection, which is why they are increasingly resorting to the use of cyber insurance. The figures are alarming: 148,104 malware attacks are launched every day, which translates into 6,172 attacks per hour. The consequences of a breach can mean dedicating a large part of a company’s resources to restoring computer systems and dealing with any ensuing penalties and lawsuits.

MFA Prompt bombing: What you need to know

Have you ever had to set up your Gmail account on a secondary device, such as your tablet, and when you tried to login, verification prompts were sent to your original device to confirm that the login attempt was done by you? You confirmed the login, and that ended it. That is exactly what happened to an Uber employee whose account was compromised.

Omdia On the Radar: Cyberpion offers a platform to reduce external attack surfaces

Download this complimentary report and learn why Omdia sees Cyberpion as well placed to carve out a share of the expanding EASM market, given the breadth of its current offering and its plans for where it needs to take its technology next.