A new solution has been introduced to address the essential third-party risk management for Software as a Service (SaaS). This solution aims to help organizations mitigate the risks associated with using SaaS providers, which often must be managed through compensating controls in the customer’s organization. Organizations using SaaS services often have less detailed risk information...Read More
The digital landscape is constantly changing, and it is important to regularly reassess how we protect web environments. While traditional antivirus solutions have their benefits, they are reactive in nature. This means that they are designed to respond to threats after they have already infiltrated a system. As a result, they may not be effective...Read More
Phishing attacks are evolving to become more sophisticated, as cybercriminals invest in new methods to deceive individuals into divulging sensitive information or installing malicious software. One of the recent trends in phishing involves the utilization of QR codes, CAPTCHAs, and steganography. These techniques are employed to carry out attacks and it is important to understand...Read More
When an employee at your organization forgets their password, it typically initiates a frustrating and time-consuming process. The employee usually needs to contact the IT department and wait for a response, leading to decreased work productivity, heightened anxiety, and potential jeopardy to deadlines. However, there are better ways to handle the password reset process, such...Read More
Scopus is an abstract and citation database used by researchers, academics, and institutions to track and analyze scientific literature. The database covers a wide range of disciplines, including science, technology, medicine, social sciences, and arts and humanities. Using Scopus, users can quickly assess the relevance and impact of a particular scientific article through the abstracts...Read More
A new cybercrime operation called ‘SecuriDropper’ has emerged, which uses a method to bypass the ‘Restricted Settings’ feature in Android to install malware on devices and obtain access to Accessibility Services. Restricted Settings is a security feature introduced with Android 13 that prevents side-loaded applications (APK files) installed from outside Google Play to access powerful...Read More
Threat actors are exploiting the ‘Citrix Bleed’ vulnerability, identified as CVE-2023-4966, to focus on governmental, technological, and legal institutions across regions such as the Americas, Europe, Africa, and the Asia-Pacific area. According to findings from Mandiant researchers, there are four continuous campaigns aimed at susceptible Citrix NetScaler ADC and Gateway devices, with these attacks having...Read More
A figure known as Prolific Puma, identified by security experts, has been offering cybercriminals the service of shortening links for over four years without attracting attention due to their discreet operations. Within just a month, Prolific Puma has managed to create numerous domains, including many within the U.S. top-level domain (usTLD), to facilitate the distribution...Read More
Google has implemented a substantial improvement in Chrome’s online security by automatically converting insecure HTTP requests into HTTPS requests for all users. This functionality, known as HTTPS-Upgrades, aims to enhance the security of older links that originally used HTTP by initially trying to establish a connection via the encrypted HTTPS protocol. While a limited introduction...Read More
Meta has introduced a revolutionary AI system that can rapidly interpret visual information from the human brain. This system records thousands of measurements of brain activity each second and reconstructs the way our minds perceive and analyze images. The research paper describes these findings as a significant advancement in the real-time decoding of the ongoing...Read More