Category: IT SECURITY GURU

New Synopsys Report Reveals Application Security Automation Soars

Today, Synopsys released BSIMM14, the latest iteration of its annual Building Security In Maturity Model (BSIMM) report. This comprehensive analysis delves into the software security practices of 130 organisations, encompassing leading companies across various industries such as cloud, financial services,…

Google bins inactive accounts

Today marks the day when Google makes good on its new policy to reserve the right to delete inactive accounts after two years of inactivity. The company defines activity as “actions you take when you sign in or while you’re…

Cyber Mindfulness Corner Company Spotlight: Pentest People

At the IT Security Guru we’re showcasing organisations that are passionate about making cybersecurity a healthier, more mindful industry. This week, Gemma Gilderdale, Head of People at Pentest People, spoke to the Gurus about Pentest People’s innovative wellbeing support, the future…

Equal Pay Day: Women, Cybersecurity, and Money

Let’s talk about women – and money. Today (22nd November 2023) marks the day that women effectively stop being paid for the year. Stop being paid against their male counterparts for the same work that they do – for the…

Cato Networks Named SASE Leader, Again

Today, Cato Networks, announced its recognition as a Leader in both the Frost Radar™: Global SASE, 2023 by Frost & Sullivan and the Market Radar: SASE 2023 by Omdia. “Once again, Cato Networks and our cloud-native SASE platform have been…

LummaC2 Stealer’s New Anti-Sandbox Technique? Trigonometry

New research by Outpost24 has revealed that malware developers are using sandbox evasion techniques to avoid exposing malicious behaviour inside a sandbox where malware is analysed by security researches. Outpost24’s threat intelligence team, KrakenLabs, discovered that malware developers are using trigonometry to…

Recognising Scam Patterns and Preventing Data Loss: A Unified Approach

Cybersecurity professionals stand on the frontlines, ever-vigilant against an increasing tide of cyber threats. From protecting sensitive corporate data to safeguarding our personal information, the battle against cybercrime is ongoing. In today’s digital era, cybercriminals are becoming more sophisticated and…

Can bcrypt Passwords Be Cracked?

Specops Software, an Outpost24 company, have released new research about bcrypt-passwords – and how easy (or not) they are to crack. This research follows previously released data on how long it takes attackers to brute force MD5 hashed user passwords with…