Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Comcast: 9 out of 10 Attempts to Breach Customer Networks Start with a Phish

The latest data from Comcast Business’ analysis of over 23.5 billion cyber attacks on their business customers shows the importance and role of phishing in attacks. Over the years there has been a consistent mantra, where everyone agrees that “90-something” percent of cyber attacks start with phishing. There have been plenty of sources that corroborate this using percentages in the 90th percentile, but the overall message is phishing is your greatest Initial Access tactic.

Number of Named Ransomware Victim Organizations Jumps 64% in One Quarter

The second quarter of this year has become the focus of some new firsts in ransomware attacks, according to new data from cybersecurity vendor Reliaquest. None of us want to see ransomware continue “up and to the right” on a chart. But it appears that this is the case, according to Reliaquest’s Ransomware Report: Q2 2023.

Salesforce Becomes the Latest Platform to Unwittingly Aid Phishing Scammers

Cybercriminals used the legitimacy of Salesforce’s email gateway to bypass security scanners and target Meta customers in an effort to steal Facebook credentials. One of the initial challenges any phishing attack has is to make it past security measures designed to scan and identify malicious emails. One such way is to misuse a legitimate well-known platform’s outbound sending of emails.

Detect Code Leaks On Public GitHub With GitGuardian Honeytoken

When your private code becomes publicly visible, you want to know about it immediately. GitGuardian Honeytoken is a quick and easy way to add leakage detection to your repositories. Get a detailed email informing you that your honeytoken has been publicly exposed. GitGuardian Honeytoken gives you the timestamp, IP address, and user agent of who triggered it, as well as what action they were trying to take.

The 443 Podcast - Episode 254 - BlackHat 2023 Recap

In this special end-of-week episode of The 443, we cover some of our favorite talks from this year's edition of the BlackHat cybersecurity conference in Las Vegas. We'll discuss the trends we saw and summaries of interesting topics including AI, nation state warfare, and improving cyber defense. You can view more information on the CISA guidance as well as Blaze Lab's full blog post at the links below.

Data Loss Prevention with Cato Networks [Demo]

Learn how quick and easy it is to secure your sensitive information with DLP from Cato Networks! In this video Robin will show you how to configure, and test, DLP Policies in less time than it would take you to drink a coffee. DLP enables organizations to define a set of rules which govern the movement of data to and from their applications. This is achieved by identifying sensitive information which matches defined data types and taking the appropriate action. DLP also identifies the file type of an asset being requested and can prevent its download of so defined.

17 Best Cloud WAAP & WAF Software in 2023

A web application firewall is a security software that observes and filters HTTP/HTTPS traffic between a web application and the internet. While this has been available for decades, with the evolution of the threat landscape, WAFs have also added additional capabilities to protect not only web apps but also APIs against a range of attacks, including DDoS and bot attacks. So, the category has evolved and is currently called Web Application and API Protection (WAAP).