Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cyberstalking vs Cyberbullying vs Cyber Harassment: What's the Difference?

According to Pew Research, 41% of Americans have experienced some form of online harassment – and the severity of incidents has been getting worse over time. Understanding what different types of online harassment look like, and what behaviors harassers engage in, can help you recognize and address it. Keep reading to learn about the different types of online harassment, consequences of online harassment and how to avoid becoming a target.

Privacy Concerns: Data Usage vs. Data Harvesting and Security

Join us in this insightful video as we delve into the core issue surrounding data privacy: is the problem primarily how data is utilized, or is it the act of harvesting and potentially insecure handling of data? We examine the importance of clearly defining the purpose for which data is collected and the need for robust security measures to safeguard sensitive information. When organizations exceed the boundaries of their intended use, questions arise about the potential misuse of data and the violation of our privacy rights. Let's navigate this complex terrain together and explore the critical role of accountability in ensuring data is used responsibly.

Iranian Threat Actor Charming Kitten Using Spear Phishing Campaign To Distribute Malware

The Iranian threat actor Charming Kitten is launching sophisticated spear phishing attacks to distribute a new version of its POWERSTAR malware, according to researchers at Volexity. “In the last few years, Volexity has observed threat actors dramatically increase the level of effort they put into compromising credentials or systems of individual targets,” Volexity says.

HTML Files Top the List as the Most Commonly Used Malicious Attachment

As executables and scripts are unable to bypass security solutions as attachments, cybercriminals turn to HTML as a means of obfuscation and malicious execution. According to analysis from security vendor Avanan, executables and Office documents as malicious attachments are almost non-existent – thanks to the solid efforts on the part of security companies and Microsoft.

Thousands of American and Southwest Airlines Pilots Exposed by Third-Party Breach

American Airlines and Southwest Airlines are both known for offering a long list of destinations throughout the United States and some other parts of the world. Two of America's largest airlines just suffered from a data breach that threatens to expose new pilots and cadets joining and hoping to join the airlines.

TrustCloud Product Updates: June 2023

Coming soon TrustCloud’s New Platform Experience Get ready for a new and improved homepage that gives you a high-level snapshot of your compliance program, risks, employee compliance, automation status, and audit preparedness—all without toggling between apps. See a sneak peek. Coming soon Ask questions, get answers in TrustCloud Forums We created FlightSchool to help you learn about our products, GRC, and trust. Now, you can join the conversation with FlightSchool Forums!

Android Malware Outbreak: Unmasking the RAT Inside a Screen Recording App

With the worldwide popularity of Android and its open-source software, hackers have an increased incentive and opportunity to orchestrate attacks. A Google search for “Android malware” brings up headlines like these, all from the past few days or weeks: SecurityScorecard recently analyzed a specific threat known as the AhMyth RAT (remote access trojan), which made headlines for infiltrating a popular screen recording app on the Google Play Store.

Securing Privileged Access in a Remote Work World: Challenges and Best Practices

In today's disconnected world, the task of managing privileged access has become increasingly challenging. The surge in remote work has exposed employees to new vulnerabilities as they access sensitive systems and data from unsecured networks and personal devices, making them attractive targets for cyberattacks. To combat these risks, organizations must adopt Privileged Access Management (PAM) solutions.

Building a security-conscious CI/CD pipeline

Continuous integration (CI) and continuous delivery (CD) has become a ubiquitous practice for DevOps teams. The CI/CD process focuses on building and deploying new applications or releasing updates to already-deployed workloads. As a result, most CI/CD efforts focus on enhancing development speeds. However, CI/CD practices can accomplish much more than enabling workload deployments.