Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Phishing Attacks Surge By 173% In Q3, 2023; Malware Threats Soar By 110%

A new report from Vade Secure has found that phishing attacks rose by 173% in the third quarter of 2023, while malware threats have increased by 110%. “While hackers were busy throughout Q3, they were most active in August, sending more than 207.3 million phishing emails, nearly double the amount from July,” the researchers write.

Facial and Dental Specialist, Fairfax, Announces Leak; 235,000+ Victims

Fairfax Oral and Maxillofacial Surgery serves the residents of Northern Virginia and the surrounding region. They employ a ten-person surgery team with six locations. Fairfax has been the target of a data breach, creating over 235,000 potential victims; your information may be at risk if you’ve been a patient of an associated facility.

Security Incident Management, Data Protection & Privacy Best Practices | Edgar P. (Group CISO @ YNV)

In this SaaSTrana podcast, Edgar Pimenta (Group CISO @ YNV Group) talks to Venky about the security incident management and data protection/privacy management best practices in highly regulated organizations such as telcos and financial. He also shares the steps on how orgnizations can prepare themselves in case of an incident breach and ways to recover from it quickly. Here are some key highlights from the discussion.

The Best IoT Solutions to Revolutionise Your Business in 2023

Ready to revolutionise your business with the power of IoT? As the digital world advances, IoT solutions bring countless possibilities to transform industries, streamline processes, and enhance customer experiences. Let’s dive into the world of IoT and explore how it can revolutionise your business, in 2023 and beyond!

Release Spotlight: Trends Page Upgrade and Bulk Data Export Functionality

In vulnerability management (VM), the task of sifting through vast amounts of data to pinpoint critical insights can feel like searching for a needle in a haystack, specifically a haystack with many precious needles that all look alike. And, of course, the one needle you’re looking for is mission-critical and can mean the difference between securing your business and leaving it open to attack.

Things You Must Know About Cyber Security in the Cloud

In our rapidly evolving and interconnected digital environment, cloud computing has transformed the manner in which organizations store, manage, and retrieve their data and software applications. The cloud offers unparalleled advantages, such as scalability, flexibility, and cost-efficiency. Nevertheless, these advantages also bring an increased emphasis on the significance of cybersecurity within the cloud.

How to protect Node.js apps from CSRF attacks

A cross-site request forgery attack (CSRF) attack is a security vulnerability capitalizing on trust between a web browser and a legitimate website. Crafty attackers manipulate browsers into executing malicious actions on websites where users authenticate themselves and log in. Often, these attacks start when users click a link attached to a deceptive email or land on a compromised website, unaware of the logic executing in the background.