E-commerce and Retail

secret leak

How Do Company Secrets Get Leaked Online?

How Do Company Secrets Get Leaked Online? Back in 2017, Facebook suffered a source code leak, initially believed to have been the result of either a developer intentionally leaking it or a security loophole in company servers. The source code … Read More

How Much Would a Technical Leak Cost You in Stolen Cloud Resources?

How Much Would a Technical Leak Cost You in Stolen Cloud Resources? If you have ever wondered how cryptocurrencies like bitcoin or monero issue  new currency, the answer is through a competition called cryptocurrency mining. This competition is open to … Read More

Docker Hub

How Sudden Policy Changes Put Company Secrets at Risk

How Sudden Policy Changes Put Company Secrets at Risk Popular among developers, Docker Hub has been used for years to share applications and code libraries. In August 2020, Docker reported its service was used by more than 6.5 million developers … Read More

ransomware report

How Ransomware Groups Enhance Their Tactics with Double Extortion and Third-Party Targeting

How Ransomware Groups Enhance Their Tactics with Double Extortion and Third-Party Targeting Protect your digital assets and infrastructure not only by following basic security guidelines, but also by understanding the threat landscape. Download this threat intelligence report to learn about … Read More

Technical Leakage

What is technical leakage and how does it happen?

What is technical leakage and how does it happen? In July, more than 50 international companies suffered a source code leak due to software development misconfigurations in DevOps applications, Bleeping Computer writes. The businesses operated in various industries, including technology, … Read More

data privacy

Why digital risk protection is vital to protect data privacy in enterprise security

Why digital risk protection is vital to protect data privacy in enterprise security Privacy concerns have lately gained some serious momentum, as Daniel Therrien, Canada’s Privacy Commissioner, has warned that existing laws are behind international standards. This stalling appears to … Read More

phishing attack example

Breaking up the Phishing Attack Chain

Breaking up the Phishing Attack Chain Phishing remains a popular attack method for malicious actors. This attack method is made possible by the wealth of services phishers can purchase on illicit markets: mass mailers, email lists, fake websites etc. Phishing … Read More

phishing spam example

Why all the Spam? How Phishing Emails Get to You

How Phishing Emails Get to You? A phishing attack is any communication (email, SMS, instant messaging) campaign launched by a malicious actor to steal personal data and credentials. Phishing attacks are one of the biggest threats to data security. According … Read More

ransomware attack example

Ransomware and Supply Chains

The Low Hanging Fruit: Your Vendors And Partners Ransomware is a growing threat to any organization, government or business. In Canada alone, it is estimated that ransomware attacks and the associated downtime cost our economy CAD$2.4 billion in 2020. HOW … Read More

loyalty fraud

5 Trends in Loyalty Program Fraud in Canada

5 Trends in Loyalty Program Fraud in Canada Loyalty programs have grown tremendously in the last decade. Memberships rose to 3.8 billion members recently , with a total value of USD$323 billion for the ecosystem. Loyalty program fraud has significantly … Read More