Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Rookie Of The Year - Lapsus$ Group

2022 saw several significant and historical cases in the ransomware industry, new players were introduced and some already have caused major damage to top-of-the-line organizations around the world. Although LAPSUS$ commenced its operations in December 2021, they have made its greatest impact in 2022, compromising major organizations such as NVIDIA, Vodafone, Samsung Microsoft, LG and Okta.

Trustwave's Action Response: The Lapsus$ Hacker Group Shows Us the Importance of Securing the Digital Supply Chain

Trustwave is actively tracking the threat of Lapsus$ for our clients. We encourage all organizations, especially those part of the digital supply chain, to remain vigilant and ensure that cyber best practices are implemented. We are actively investigating all unusual login behaviors for clients that use Okta. For more information on the Okta incident, please visit their blog. Trustwave does not use Okta. Actionable security recommendations for organizations can be found below.

Large-scale npm attack targets Azure developers with malicious packages

The JFrog Security research team continuously monitors popular open source software (OSS) repositories with our automated tooling to avert potential software supply chain security threats, and reports any vulnerabilities or malicious packages discovered to repository maintainers and the wider community. Two days ago, several of our automated analyzers started alerting on a set of packages in the npm Registry.

Lookout ZTNA - Intro to onboarding an application, securing access and protecting sensitive data.

In this Lookout ZTNA demo video, you will see how to onboard an application that is within your corporate network, how to secure access to the application using identity-driven policies and how to apply data protection policies to protect sensitive data.

Securing the Future of Data - A New Way to Think About Control

Control For decades it's been the mandate for enterprise security teams. Keep data secure. Lock it down. Restrict access. Put it behind firewalls. Don’t let it slip on to personal devices. But everything has changed. The cloud, SAAS, mobile workforces, an unstoppable wave of BYOD. Today, users and the applications they depend on are more widely distributed than ever. Networks are increasingly exposed. Cyber threats grow sophisticated by the minute.

Cloud Security Reimagined | Think it. Build it. Secure it.

Experience the power of the world’s most advanced cloud security platform. Gain full visibility and control across all clouds and applications. Build securely, accelerate application delivery and time to market. Automate security across the entire application lifecycle and improve security without compromising performance.

Cloud Security Reimagined | Stop Breaches

With the growth in cloud and the need for speed and agility in today’s digital business it’s vital to have a cloud security solution that goes beyond simply detecting threats leaving you to do all the work. At CrowdStrike we take an adversary approach and we stop breaches, while eliminating shadow IT, reducing complexity and actually securing the cloud infrastructure, apps and data across any cloud.