Skip to content

Priyanka Aash

EASM Gartner Firecompass

FireCompass In Gartner Hype Cycle: External Attack Surface Management

In The Endpoint Security Hype Cycle, Gartner tracks the innovations that aid security leaders in protecting their enterprises from attacks and breaches. The report talks about the adoption of new use cases and technologies such as Attack Surface Management (ASM), BAS, Exposure Management (EM) …etc. Gartner recognizes FireCompass as a leader in the EASM (External Attack… Read More »FireCompass In Gartner Hype Cycle: External Attack Surface Management

Paypal Credential Stuffing Blog Post Firecompass

Lessons from PayPal’s Credential Stuffing Attack That Affected 35K Users

Last month, PayPal was hit by a credential stuffing attack, a type of cyber-attack where hackers use lists of stolen login credentials, typically obtained from data breaches or other sources, to gain access to user accounts on various platforms.  The attack occurred between December 6 and December 8, and the company was able to detect… Read More »Lessons from PayPal’s Credential Stuffing Attack That Affected 35K Users

5 Sessions That You Can’t Miss @ GISEC Global 2022

GISEC 2022 has multiple tracks… So we have put together a list of 5 talks that you cannot miss! >>Register Now (Complimentary Pass) 1. DDoS Attacks Against Telecom; Who Takes The Blame? Monday, March 21, 13:40 – 14:10 GST (Meeting Room) Francisco Z. Gaspar,Lead Cybersecurity, Telefónica, Germany Shaju Bhaskaran,Information Security Officer & Head of SOC… Read More »5 Sessions That You Can’t Miss @ GISEC Global 2022

Colonial Pipeline Ransomware Attack: What Happened? What You Can Learn?

Colonial Pipeline, a privately held largest pipeline operator in the United States was forced to proactively close down operations and freeze IT Systems after being a victim to a massive cyber attack.  What Happened? Darkside, a ransomware clan, has taken the responsibility for the attack. What they managed to do was, strike the Colonial Pipeline’s… Read More »Colonial Pipeline Ransomware Attack: What Happened? What You Can Learn?