News

2023: Darkbeam failed to follow database security best practices, publicly exposing their Elasticsearch & Kibana interface. No data exfiltration was reported.
New research reveals that employees engage with 44% of read vendor email compromise attacks. See which industries and roles are most vulnerable to this threat.
QR codes promise convenience, but most people don’t realize the sheer ease with which those codes can be weaponized. Learn ...
QR codes promise convenience, but most people don’t realize the sheer ease with which those codes can be weaponized. Learn more about the new “quishing” threat.
Steer clear of the dangers of oversharing on social media. This blog offers examples of what can go wrong and easy-to-follow ...
Learn what e‑skimming is, why it’s so dangerous, how PCI DSS v4.x addresses it, and some of the options available to help you ...
Steer clear of the dangers of oversharing on social media. This blog offers examples of what can go wrong and easy-to-follow steps on how to do things right.
This publication from the CSA AI Technology and Risk Working Group addresses the unique security challenges of agentic AI. As AI transitions from passive tools to autonomous decision-makers, ...
Learn how homoglyph attacks work, why they’re a growing concern for major brands, and how DNS Posture Management defends ...
Written by Derek Hammack, VP, Operations and Customer Success, CheckRed. Cybercriminals are getting smarter—and stealthier. One of the most dangerous and overlooked threats to your brand is ...
CSA’s CCM includes cloud security monitoring and logging controls. Implement effective incident response, audit log security, clock synchronization, and more.