Skip to content

Researchers Share New Insights Into RIG Exploit Kit Malware’s Operations

RIG Exploit Kit (EK) has become increasingly successful in exploiting vulnerabilities, reaching an all-time high successful exploitation rate of nearly 30% in 2022, according to new findings from the Swiss cybersecurity company PRODAFT. The kit is a financially-motivated program that has been active since 2014 and is used to distribute malware to large numbers of… 

Shocking Findings from the 2023 Third-Party App Access Report

As SaaS-to-SaaS app installations are on the rise, organizations are presented with a unique challenge: how to control the proliferation of applications and the resulting risk to their data. In order to better understand the scope of the problem, Adaptive Shield has released a report on the risks and realities of third-party connected apps. Here… 

Breaking the Security “Black Box” in DBs, Data Warehouses and Data Lakes

Securing data stores is a difficult and frustrating task for security teams. They lack visibility into audit logs from multiple data sources, and have to rely on data teams to locate and enforce access controls and security policies. This can weaken the business’s security and compliance and put it at risk of exposing sensitive data,…