Meet the Startups Event

We’re thrilled to announce that we’re among the guests at Oracle’s “Meet the Startups” event on June 14 2022! Our CEO, Gerasim Hovhannisyan is going to speak about how our team is ...

Pre-Hijacking Attacks on Social Media Accounts | Avast

| | Security News
A new paper by the Microsoft Security Response Center explains account pre-hijacking, where attackers open an account with the victim’s email address then lie in wait for the victim eventually to join ...
Takeaways From the 2022 DBIR: It All Comes Back to Passwords

Takeaways From the 2022 DBIR: It All Comes Back to Passwords

Like clockwork for the last 15 years, the Verizon Data Breach Investigations Report (more affectionately known as “The DBIR”) was released today. It contains 108 pages of detailed information and insights regarding ...
GUEST ESSAY: Why organizations need to prepare for cyber attacks fueled by quantum computers

GUEST ESSAY: Why organizations need to prepare for cyber attacks fueled by quantum computers

In today’s times, we are more aware of cyberattacks as these have become front-page news. We most recently witnessed this as Russia invaded Ukraine. Cyberattacks were used as the first salvo before ...
Automating Azure Abuse Research — Part 1

Automating Azure Abuse Research — Part 1

Automating Azure Abuse Research — Part 1IntroBack in February of 2020 Karl Fosaaen published a great blog post about abusing Managed Identity (MI) assignments, specifically those assigned to a Virtual Machine running in Azure. Karl’s ...

How license plate scanners challenge our data privacy

| | Privacy, Security News
As more communities install automated license plate readers (APLRs) to monitor vehicle traffic, there are growing concerns about the privacy and efficacy of these tools. Stories have appeared in local newspapers, such ...
GUEST ESSAY: Deploying ‘XDR’ can help companies avoid the security ‘vendor-silo’  trap

GUEST ESSAY: Deploying ‘XDR’ can help companies avoid the security ‘vendor-silo’ trap

According to recent data from Oracle and KPMG, organizations today employ over 100 cybersecurity products to secure their environments. These products play essential roles in detecting and preventing threats. Related: Taking a ...

Microsoft research reveals the changing face of skimming campaigns

| | Security News
In a recent report, Microsoft’s 365 Defender Research Team reveals new obfuscation techniques that are changing the face of skimming. By observing recent web skimming campaigns, Microsoft’s security researchers have discovered the ...
Owen Garrett, Deepfence | Kubecon + Cloudnativecon Europe 2022

What a Week! KubeCon + CloudNativeCon Europe 2022

This year’s KubeCon + CloudNativeCon Europe was an incredible, electrifying event! We hope you had as much fun engaging with new people and ideas as we did. In this post, we’ll share ...
Passwordless authentication moves to the mainstream by Byron Acohido

MY TAKE: Businesses gravitate to ‘passwordless’ authentication — widespread consumer use up next

Google, Microsoft and Apple are bitter arch-rivals who don’t often see eye-to-eye. Related: Microsoft advocates regulation of facial recognition tools Yet, the tech titans recently agreed to adopt a common set of ...