Leveraging HITRUST Compliance to secure and stay ahead
Maintaining compliance across a chaotic security environment is always daunting. The Client chose HITRUST as a standard and requested Propelex to help the them identify gaps and achieve certification.
Promote Safer IoT Practices
Promote safer IoT practices. Enhance security in the Internet of Things ecosystem to protect privacy and data. IoT devices are vulnerable to cyber attacks that can lead to a variety of problems. Whether it’s a carwash being shut down, a hospital’s emergency system...
Data Privacy Compliance Through Cybersecurity
Ensure data privacy compliance with a strong cybersecurity strategy. Learn how security measures safeguard sensitive information. Cybersecurity frameworks provide a set of standardized procedures for organizations to establish and maintain cybersecurity controls....
GuardDuty Expands AWS Security
GuardDuty expands AWS security. Discover how this enhancement bolsters protection for cloud-based resources. Gartner reports that 99% of cloud failures are the customer’s fault due to mistakes like misconfiguration. However, many security and DevOps teams are...
Akamai Acquires API Security
Akamai acquires API Security. Learn how this move impacts the field of web security and application protection. The number of APIs used by enterprises is skyrocketing, creating massive security vulnerabilities. But many organizations aren’t aware of the number,...
TSA Aviation Cyber Directive
Understand the TSA aviation cyber directive. Stay informed about cybersecurity measures in the aviation industry. The TSA issued an emergency cybersecurity amendment to its security programs for airport and aircraft operators. These new requirements build on...
Microsoft Efile Tax Return Software Malware Detection
Microsoft Efile tax return software now includes enhanced malware detection. Secure your financial data with confidence. With U.S. Tax Day approaching on April 18, Microsoft is sharing detections and recommendations to help customers stay protected. Threat actors...
Crypto Money Laundering Bust
Major crypto money laundering bust. Get the details on this significant operation against illegal financial activities. US and German law enforcement have taken down crypto-mixing service ChipMixer, allegedly used by criminals to launder more than $3 billion worth...
Chick-fil-A Customers Bone to Pick Data Breach
Chick-fil-A customers have a bone to pick over data breach. Stay informed about the breach and safeguard your data. Chick-fil-A has been hit by a cyberattack stealing customer information. The fast food chain says the attack lasted for more than two months. The...
New Forrester Study Revelation
New Forrester study revelation. Stay updated on the latest findings shaping the business and technology landscape. The tumultuous economy and increasingly sophisticated cyber threats are just two of the critical risks businesses face today. To mitigate these risks,...
Fortra Health and IAC Join Forces
Fortra Health and IAC join forces to eliminate illicit Cobalt Strike tools. Combating cyber threats with a united front. Fortra takes significant steps to prevent abuse of its Cobalt Strike software for post-exploitation adversary simulation, including stringent...
Lightspin Launches Remediation Hub
Lightspin launches Remediation Hub. Discover new tools for streamlined security remediation and risk management. Last week OWASP released their Top 10 Web Security Vulnerabilities 2021 updated from 2017. Lightspin’s remediation hub leverages graph technology to...
DirectDefense’s 2022 Threat Report and 2023 Trends
DirectDefense's 2022 Threat Report & 2023 Trends: Insights into evolving cybersecurity challenges and future security trends. DirectDefense provides enterprise risk assessments, 24/7 managed services, penetration testing and ICS/SCADA security services....
Deepfakes and Digital Propaganda: Undermining Trust
Deepfakes and digital propaganda undermining trust. Explore the impact of manipulated content on information credibility. Whether you want to put new words in a politician's mouth or make Jon Snow dance, deepfakes are the 21st century's answer to Photoshop....
Global ICS Systems Attacked Malware 2022
40 global ICS systems attacked malware in 2022. Dive into the details of this significant cybersecurity incident. During the second half of 2022, threats that use scripts and spyware continued to increase. Threat actors also used cryptocurrencyminers. BEC jumped to...
Android Malware Targets 450 Financial Institutions
Android malware on the prowl: Targets 450 financial institutions. Learn how to safeguard your mobile banking security. Cybercriminals are targeting customers of 450 financial institutions worldwide with a dangerous new android malware. It's a banking trojan called...
Microsoft’s Azure Service Fabric XSS Patch
Stay secure with Microsoft's Azure Service Fabric XSS patch. Keep your applications protected from cross-site scripting vulnerabilities. Cloud cybersecurity startup Orca Security Ltd. today shared details of a previously unknown Microsoft Azure vulnerability that...
IceFire Ransomware Windows Shift
IceFire ransomware signals Windows-only malware shift. Explore the implications of this changing cybersecurity landscape. In recent cyberattacks, hackers have been deploying the IceFire ransomware against Linux enterprise networks—a notable shift for what was once...
Lessons Learned From Penetration Tests
Discover 5 valuable lessons learned from penetration tests. Improve your security strategy based on real-world insights. Pen testing involves identifying vulnerabilities in the target system & fixing them. It's often a lengthy process that requires extensive...