Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

CVE-2022-24086 Vulnerability alert for websites using Magento Ecommerce

Magento has been a much used and loved e-commerce platform since its initial release in 2008. One of the things I’ve always loved about Magento is its ability to grow as ecommerce businesses grow. Starting as a self-hosted version (which I’ve used extensively as a developer over the years), Magento now has clear support and management options available via Adobe or third party ecosystem partners.

AvosLocker - the Rising Star of Ransomware

AvosLocker is a relatively new ransomware written in C++ that was first seen in June 2021. Their business model is ‘Ransomware-as-a-Service’ (RaaS), and even though they have been operating for less than a year now, they’ve been successful overall when it comes to victims. The group openly and publicly tries to recruit new members to its team and operates a TOR leak site, showcasing the latest victims, as all other ransomware groups do.

CloudCasa Adds to Cyber Resilience with Kubernetes Security Posture Reviews

CloudCasa was built to provide data protection services for Kubernetes and cloud native workloads. As a SaaS backup solution for Kubernetes, CloudCasa was designed from the ground up to be a secure, well-architected, SaaS platform that improves a customer’s security posture against sophisticated cyber-attacks.

Best Practices and Pitfalls for Using Open Source Components in Fintech

Financial technology companies are at the forefront of banking evolution, driving innovation and fighting to stay ahead of both the large bank behemoths and the next wave of fintech companies coming along behind them. In this webinar, Peak6 Director of Open Source, and Snyk Field CTO and Field CISO, discuss best practices for secure development in highly regulated Fintech companies.

Between Two Cones | Mitigating Construction Project Risks with CCPI

In this video, CPPI’s Director of Technology, Brad Buckles, and Egnyte’s Senior Manager of AEC, Nick Decker, discuss mitigating risk in construction projects. Brad outlines his three pillars of risk management: safety, scheduling, and financial, and the tools, techniques, and proactive steps that CPPI takes to reduce their exposure and impact. Between Two Cones is a recurring leadership series featuring AEC experts speaking on the latest trends and most significant challenges the industry faces. Whether you’re a seasoned professional or new to the industry, there is something for everyone.

U.S. government warns that sensitive data is being stolen from defence contractors

The Federal Bureau of Investigation (FBI), Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA), and National Security Agency (NSA) have joined forces to publish a joint warning that Russian hackers have targeted defence contractors to steal sensitive data.

Calico Cloud: Active build and runtime security for cloud-native applications

Calico Cloud has just celebrated its 1-year anniversary! And what better way to celebrate than to launch new features and capabilities that help users address their most urgent cloud security needs. Over the past year, the Tigera team has seen rapid adoption of Calico Cloud for security and observability of cloud-native applications.