Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Friday Flows Episode 14: Analyze phishing email senders, URLs, and attachments

It took us 14 episodes but we're finally highlighting the #1 most popularly used story in the Tines Library. Investigating phishing email senders, URLs, and attachments can eat up hours of an analyst’s time - this Tines story demoed by Michael Tolan does everything for you. Connecting services like VirusTotal, urlscan.io, and EmailRep from Sublime Security across multiple story forks, it includes several options for submitting suspicious emails and displaying the results.

The Art of Chrome Extension Development: A Comprehensive Guide (Without Code) Introduction

Google Chrome, a highly popular web browser globally, boasts an array of functions and capabilities that elevate the browsing experience. Notably, it allows users to craft bespoke extensions. These extensions can tweak and amplify the browser's performance to suit individual requirements, whether for increased productivity, entertainment, and more.

Enterprise Software Security: Challenges and Best Practices

In an age where digital information is critical, enterprise software security is more important than ever. As organizations increasingly rely on complex software systems to manage their operations, the risks and vulnerabilities associated with these systems are growing. This article examines the key challenges in enterprise software security and outlines best practices for mitigating these risks.

How Cybercriminals Use the Dark Web to Undermine Security

Major search engines merely scratch the surface, exploring 4% of the vast web. Concealed within the deep web, the dark web emerges as a hub for cybercriminal activities. This covert digital underworld operates anonymously outside conventional browsers, providing an ideal haven for cybercriminal coordination beyond law enforcement's grasp.

The human element - cybersecurity's greatest challenge

The stark reality of cybersecurity today isn't merely a question of advanced software or strategic counterattacks. It's about people. The financial impact is undeniable with cybercrime costs projected to reach an astonishing $10.5 trillion annually by 2025. Yet, beneath these figures lies a more pressing issue: the exploitation of human psychology. According to Verizon's 2023 Data Breach Investigations Report (DBIR), 74% of all breaches involve the human element, including social engineering attacks, errors, or misuse, while half of all social engineering attacks feature pretexting incidents - which is almost double from the year before.

PCI Compliance Levels: A Developer's Guide to PCI Compliance

Compliance is something that developers dislike. Traditionally led by risk and information security teams, compliance standard enforcement in organizations is not something software engineers are trained to do. So when the words “PCI compliance” are tossed around, for many developers it mentally translates to limitations, guardrails, bottlenecks, and drastic changes to their workflows that impact productivity. But that doesn’t have to be the case.

Rise of cloud agnosticism: challenges and myths

In the evolving landscape of technology, cloud agnosticism has seen increasing traction. This refers to the ability to design and deploy applications seamlessly on any cloud platform, whether that be AWS, GCP, Azure, or others. Cloud agnosticism is essentially a design principle that advocates for flexibility, portability, and interoperability, allowing organizations to use multiple cloud providers without being tied to the services or infrastructure of any single one.

$9 million seized from "pig butchering" scammers who preyed on lonely hearts

US authorities have seized almost $9 million worth of cryptocurrency linked to a gang engaged in cryptocurrency investment fraud and romance scams. The US Department of Justice has announced that the seized funds are connected to cryptocurrency wallet addresses alleged to be associated with a "pig butchering" gang that has claimed over 70 victims around the world. "Pig butchering" is one of the world's fastest-growing types of scams.