Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

opsdemon

Latest posts

How to Migrate VMware VMs to Nutanix

Nutanix is a hyper-converged virtualization platform for running virtual machines. It can be used as an additional infrastructure or an alternative to VMware vSphere and Microsoft Hyper-V. For more information, you can read this VMware vs Nutanix comparison. You can migrate VMware virtual machines (VMs) from ESXi hosts and clusters to a Nutanix cluster. Read this VMware to Nutanix migration guide to learn how to configure the migration properly.

Meta Fined Euro91 Million for Storing Facebook and Instagram Passwords in Plaintext

In a significant blow to its reputation and data security practices, Meta has been fined €91 million ($101.56 million) by the Irish Data Protection Commission (DPC) for a major security lapse dating back to March 2019. The investigation revealed that millions of Facebook and Instagram users' passwords were stored in plaintext, an alarming oversight for a company of Meta's scale and influence.

How to Increase Business Security with a Zero Trust Approach

Traditional cybersecurity protocols quickly become out of date as cyberattacks and criminals evolve. Organizations are constantly on the lookout for new measures to prevent these attacks and keep their business and client data secure. This is why the zero-trust security principle is rapidly being adopted by organizations everywhere to help them save millions in data breach costs, which hit an all-time high of $4.88 million in 2024.

More security visibility for 1Password Teams accounts with new reporting trial

It’s no secret that it’s hard to protect against what you can’t see. One of the biggest challenges facing security and IT experts is visibility into whether their team is following business security best practice – and this is especially true for small businesses.

Saudi Arabia's PDPL

Saudi Arabia's Personal Data Protection Law (PDPL), enacted in 2021, marks a significant step in regulating the processing of personal data in the Kingdom. The PDPL aims to protect individuals' privacy by setting out clear rules on how personal data can be collected, processed, stored, and shared. As more businesses undergo digital transformations, the PDPL holds companies accountable for safeguarding data and ensuring transparency in their handling of personal information.

Deduplicate Vulnerabilities with the Nucleus Platform's New CVEs Page

Vulnerability management is often a complex task, particularly when using multiple scanning tools or dealing with the constant flow of new CVEs. Different scanners can uncover the same vulnerability but provide different insights or look at different metadata, making it look like one vulnerability is several without the proper context. We are excited to introduce the Nucleus CVEs Page, designed to enhance how your organization manages vulnerabilities across projects.

New VPN Credential Attack Goes to Great Lengths to Obtain Access

A new “so-phish-ticated” attack uses phone calls, social engineering, lookalike domains, and impersonated company VPN sites to gain initial access to a victim network. This is one of the most advanced initial access attacks I’ve seen. Security analysts at GuidePoint Security have published details on a new attack that tricks users into providing the attacker with credentialed access.