Top 10 Node.Js Security Best Practices
Best Security Practices in Nodejs By Harikrishna Kundariya, CEO, eSparkBiz Node.js is one of the most popular frameworks for web and mobile application development. It is JavaScript runtime which works…
5 Ways Cybersecurity Will Change In 2022
By Jaime Coreano, Vice President of Sales – Flexxon The annual cost of cybercrime is set to hit $10.5 trillion by 2025. The losses caused by theft, fraud and embezzlement…
Are You Prepared for the New Normal of Jekyll and Hyde Data?
An organization’s data and secrets are simultaneously its greatest assets and its greatest risks. By Howard Ting, CEO, Cyberhaven Recently Twitch suffered a devastating hack that exposed its most sensitive…
Is XDR The Right Solution for Today’s Security Threats?
Defining XDR’s Role in the Security Stack By Steve Garrison, VP Marketing, Stellar Cyber XDR and Open XR are two of the latest buzzwords in the cybersecurity tools market, but…
Looking Ahead: Five Security Trends For 2022
A look at some of the key security trends for next year By Mark Guntrip, Strategy Leader at Menlo Security. Ransomware and the fight back Ransomware has dominated the…
Phishing: How To Improve Cybersecurity Awareness
By Jason Stirland, CTO at DeltaNet International According to research by Proofpoint, 75% of organizations around the world experienced a phishing attack in 2020, and 74% of attacks targeting US businesses were…
12 Tips for Improving Access Control in Your Organization
By Bryon Miller ASCENT In today’s world, we have more access to essentially all that’s available in our lives. More access to people and places. More access to information and…
‘Spider-Man: No Way Home’ used to spread a cryptominer
Threat actors attempted to take advantage of the interest in the new ‘ Spider-Man: No Way Home’ movie to spread a Monero Cryptominer. Threat actors are attempting to capitalize the…
Conti ransomware gang exploits Log4Shell bug in its operations
The Conti ransomware gang is the first ransomware operation exploiting the Log4Shell vulnerability to target VMware vCenter Servers. Conti ransomware gang is the first professional race that leverages Log4Shell exploit to compromise…
It’s About Time: The Unappreciated Fundamental Metric for Security
By Winn Schwartau During the Cold War, the US defended us poor, soon-to-be-nuked citizenry, with time. If the Soviets got it into their heads to send over a six-pack of…
Crooks injects e-skimmers in random WordPress plugins of e-stores
Threat actors are injecting credit card swipers into random plugins of e-commerce WordPress sites, Sucuri researchers warn. Sucuri researchers are warning of threat actors injecting credit card swipers into random…
FBI training document shows lawful access to multiple encrypted messaging apps
Which are the most secure encrypted messaging apps? An FBI document shows what data can be obtained from them. The Record shared an FBI training document that reveals the surveillance…