Blog Series
cybersecurity
Cybersecurity Insurance’s Usefulness Questioned Yet...
Cybersecurity insurance policies are considered by many to be a last resort safety net that, when things go wrong in a terrible way, provides at least a bit of hope...
What Does the Florida Water...
It’s the making of a horror film: a cyberattack that tampers with the water supply of a city and poisons the residents. It nearly happened in the real world. In...
MasquerAds: The malware campaign defrauding...
According to a Guardio Labs report, “MasquerAds” malware targets organizations, GPUs, and Crypto Wallets by using the Google Ads platform to spread malware to users searching for popular software products....
Top Cybersecurity Defense Trends For...
As expected, 2022 was a tough year for cybersecurity, with one headline-grabbing cyberattack after another – and there are no signs that 2023 will go any easier for cybersecurity teams. ...
Okta records theft of source...
Okta has revealed that a malicious users hacked and replicated its source code repositories on GitHub earlier this month, after previously reporting a compromise carried out by South American hacking...
Vice Society using custom ransomware...
SentinelOne researchers discovered that the Vice Society group has released PolyVice, a custom ransomware that employs a reliable encryption scheme based on the NTRUEncrypt and ChaCha20-Poly1305 algorithms. The PolyVice is...
Struggling with MTTP? Check Out...
In cybersecurity, metrics provide a way to measure cybersecurity performance and point to how successfully you’re defending your technology assets. Mean time to patch, or MTTP, is a key indicator...
Vulnerabilities found in Ghost Newsletter...
According to Cisco Talos, two vulnerabilities in the Ghost CMS newsletter subscription system, CVE-2022-41654, and CVE-2022-41697, exist in the newsletter subscription functionality of Ghost Foundation Ghost 5.9.4. External users can...
Worried About CX Scores? Get...
Retention rates, NPS, customer score… if you work in the IT department of a telecoms company or any client-facing team, you’ll know all about the customer metrics used to evaluate...
How Can Third-Party Application Patching...
Did you know that 75% of cybersecurity threats occur due to the vulnerabilities present in third-party applications? In this blog, we’ll be discussing how patch management is a crucial and...
What We Know So Far...
Frameworks are an effective tool in cybersecurity because of the complexity of cybersecurity challenges and because so many organizations have so little structure to their cybersecurity operations. Introduced in 2014,...