Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Industry Experts Weigh In: Addressing Digital Native Security Challenges

Keeping up with today’s rapidly evolving threat landscape is an ongoing journey for software development enterprises in cloud-native environments, as many struggle to keep their assets and customers secure while keeping up with the competitive pace of software delivery in cloud native environments. Earlier this summer WhiteSource hosted a roundtable discussion with HackerOne, AWS, and IGT about the new security challenges enterprises face as they shift to a digital native environment.

SecureAPlus - 12 Antivirus Engines in One Application

SecureAPlus is a PC security solution that’s guaranteed to protect you from all of today’s digital threats, such as malware and viruses. Not a traditional Anti-Virus: The powerful Application Whitelisting technology ensures that only applications that you trust are run by your computer. All malicious attacks that slip by unwary users are always detected and initially blocked. It puts you, not anyone else, in control.

New Phishing Attacks Exploiting OAuth Authentication Flows (Part 3)

This blog series expands upon a presentation given at DEF CON 29 on August 7, 2021. In Part 1 of this series, we provided an overview of OAuth 2.0 and two of its authorization flows, the authorization code grant and the device authorization grant. In Part 2 of this series, we described how a phishing attack could be carried out by exploiting the device authorization grant flow.

Netskope Threat Coverage: LockBit

LockBit Ransomware(a.k.a. ABCD) is yet another ransomware group operating in the RaaS(Ransomware-as-a-Service) model, following the same architecture as other major threat groups, like REvil. This threat emerged in September 2019 and is still being improved by its creators. In June 2021, the LockBit group announced the release of LockBit 2.0, which included a new website hosted on the deep web, as well as a new feature to encrypt Windows domains using group policy.

How to Build a Startup Security Team: Advice from Security Experts

With the rise of security threats comes an increased need for strong security measures, but it’s hard to know where to invest your time and money, especially if you’re a small startup. Who should own security when you first get started? Is it worth it to hire a Chief Security Officer (CSO) right away? Is it better to build out an internal security team or hire an external agency instead?

A Pie Chart of the Biggest Data Breaches [Revised for 2021]

Below is a pie chart representing the percentage contribution of each data breach victim to the 57 largest data breaches of all time. CAM4 covers the majority of the pie, accounting for almost 50% of all compromised records. If the CAM4 breach is disregarded, the impacts of the other breaches can be better appreciated. The pie chart below represents this updated distribution. Now, it becomes clearer that LinkedIn accounts for the majority of compromised social media records.

Midway Swiss Case Study: Journey towards CMMC Compliance with Ignyte

This webinar is designed for Small & Midsize Businesses that work as federal prime or subcontractors. Our guest, Jayme Rahz, CEO at Midway Swiss Turn, represents a local manufacturer that has recently undergone a series of guided steps with Ignyte’s team and implemented over a hundred vital controls into their cybersecurity routine to become NIST and CMMC compliant and be able to conduct a self-assessment for the NIST 800-171 SPRS submission.