Tag: third-party compromise

third-party compromise

The Business of Extortion: How Ransomware Makes Money

June 9, 2021 | 8 Min Read

We can't stop talking about it: Ransomware. It's dominating a lot of security news for sure, which also means it's definitely in the media cycle and on everyone's mind. Ransomware groups have...
How Cybercriminals Can Leverage Your Vaccination Card Selfie

How Cybercriminals Can Leverage Your Vaccination Card Selfie

May 13, 2021 | 6 Min Read

Gotta do it for the ‘Gram (Instagram), as the kids might say. After a year in quarantine, you just got...
Threat Intelligence Can Be Noisy: SearchLight Helps

Threat Intelligence Can Be Noisy: SearchLight Helps

February 16, 2021 | 6 Min Read

Let’s start with a scenario. You’ve finally convinced the business to begin the journey of building up a threat intelligence...
Help your development teams keep their keys safe

Help your development teams keep their keys safe

October 7, 2020 | 3 Min Read

Modern development practices are a blessing and a curse for organizations. Efficiency gains delivered by distributed workforces, and blended in...
Modern Software Development and DevSecOps: Despite security controls, data leaks persist

Modern Software Development and DevSecOps: Despite security controls, data leaks persist

June 22, 2020 | 15 Min Read

Quick Synopsis No matter how many software developers you employ, development processes or cultures (such as DevOps or DevSecOps) that...
Leaky SMB File Shares – So Many Bytes!

Leaky SMB File Shares – So Many Bytes!

June 19, 2019 | 5 Min Read

Everyone loves a sequel. If you’re an avid Marvel fan, you’re probably sitting on the edge of your seat waiting...