Recent Security News
-
Preventing data theft with ADX technology
November 8, 2023 at 04:29AM Blackfog is offering a webinar on November 15th to discuss their on-device anti data exfiltration technology. The webinar will address the importance of preventing data exfiltration and how their AI-based behavioural analytics can limit unauthorized data transfer. The event will also cover the limitations of traditional AV solutions and highlight…
-
Webinar: Kickstarting Your SaaS Security Strategy & Program
November 8, 2023 at 04:21AM This article discusses the importance of securing SaaS applications, which make up 70% of a company’s software usage. Safeguarding the organization’s SaaS app stack and data is crucial, but implementing an effective SaaS security program is complex due to various potential attack vectors and dynamic app environments. A webinar with…
-
Bad eIDAS: Europe ready to intercept, spy on your encrypted HTTPS connections
November 8, 2023 at 03:31AM Lawmakers in Europe are set to approve digital identity rules known as eIDAS 2.0, which civil society groups argue will make the internet less secure and increase the risk of online surveillance. One of the requirements of the legislation is that browser makers must trust government-approved Certificate Authorities (CAs) and…
-
Experts Expose Farnetwork’s Ransomware-as-a-Service Business Model
November 8, 2023 at 03:21AM Cybersecurity researchers have identified a threat actor known as farnetwork, who has been involved in multiple ransomware-as-a-service (RaaS) programs, including JSWORM, Nefilim, Karma, and Nemty. They have recently launched their own RaaS program using the Nokoyawa ransomware. The threat actor is adept at using stolen corporate account credentials to carry…
-
Securing Remote Workers Through Zero Trust
November 8, 2023 at 01:10AM Zero trust has shifted from theory to implementation in recent years, particularly in the context of remote work. Many organizations are adopting a zero-trust approach to improve security. Verifying identity with each connection attempt is crucial, as it ensures device security and authentic identity. While the path to zero trust…