Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Guide to User Access Review: What Is It, Best Practices, and Checklist

Every company has workers that have been there from the beginning and worked in every department. Knowledge of the company’s processes makes them valuable employees, but they can also access and put at risk lots of sensitive data. Regular user access reviews can help you mitigate this risk and safeguard your critical assets. Regularly reviewing user access is an essential part of access management.

New RAT: The Discovery of RevolutionRAT

The InfoStealer and remote-access-tools (RATs) markets constantly provide us with new products. The Cyberint Research Team discovered a new RAT that is claiming to be the next popular threat against organizations and individuals worldwide. With fairly interesting PR and marketing methods, RevolutionRAT seems to be gaining attention with a growing Telegram community after only a few days of operation.

Ransomware Trends 2023, Q2 Report

The ransomware industry has been a prominent player this quarter, causing significant impact and affecting numerous organizations globally. With its widespread threat, the industry has successfully claimed 1386 victims. The industry is feeling increasingly impacted by ransomware as many critical vulnerabilities were discovered this quarter. Additionally, the emergence of new groups, both from the end of 2022 and during this quarter, has contributed to the industry’s growth.

5 Things Everyone Needs to Know About GRC

Over the following years, the costs associated with cybercrime, projected at $10.5 trillion annually by 2025, will exceed the estimated worldwide cybersecurity spending—$267.3 billion annually by 2026. Leadership needs to change its perspective on managing cyber risks instead of just spending more money to match the losses incurred.

What is a YubiKey? How Does it Work? [Detailed Guide]

Aren’t you a tech junkie? It does not matter anymore with YubiKey! But you must be thinking about how. This comprehensive guide dedicated to Yubikey will describe and update every necessary detail. As a reader, you must seek a one-stop solution for all your needs and asks about this device. And we have made sure to be mindful of it and curate content below that can surely answer your questions and doubts.

Methods to Follow While Accessing Customer Sensitive Data | (Sanjay - Executive Director, MSCI)

Here are some highlights of the conversation between Sanjay (Executive Director, MSCI) and Venky (Founder, Indusface). Sanjay has worked in Microsoft for over 14+ years and shares his experience on secure coding best practices & methods to handle customer-sensitive data.

Three Guiding Principles to Follow in Cybersecurity | (Sanjay - Executive Director, MSCI)

Here are some highlights of the conversation between Sanjay (Executive Director, MSCI) and Venky (Founder, Indusface). Sanjay has worked in Microsoft for over 14+ years and shares his experience on secure coding best practices & methods to handle customer-sensitive data.

From Paper to Digital: Transitioning to OCR Bank Statements

Banks and other financial organisations must digitise their information for quicker storage and retrieval as they process millions of client papers annually. An developing technique called optical character recognition (OCR) makes it possible to extract data from PDFs and photos and convert them to Excel, CSV, and other formats. With the use of OCR, banks can swiftly extract client information from PDF documents, transform it, and make it searchable.

New Vulnerability in protobuf.js: Prototype Pollution - CVE-2023-36665

We have found a new Prototype Pollution vulnerability in protobufjs (CVE-2023-36665). The maintainer of protobufjs has issued an update that fixed the issue on 27 June 2023. The vulnerability was discovered by Peter Samarin using Jazzer.js with our newly integrated Prototype Pollution bug detector. This finding emerged in part from our collaboration with Google's OSS-Fuzz and puts affected applications at risk of remote code execution and denial of service attacks.