Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cyberattacks

The Role of DevSecOps in Modern Software Development

In today's fast-paced digital world, security threats are becoming more sophisticated, requiring businesses to integrate robust security measures into their software development lifecycle. Traditional development approaches often treat security as an afterthought, leading to vulnerabilities that can be costly to fix. This is where DevSecOps comes into play-an approach that embeds security into the DevOps pipeline from the start, ensuring that security is a core component rather than an add-on.

From Initial Access to Ransomware Attack: An Analysis of Timelines from IAB Listings on Cybercriminal Forums to Extortion Attacks

Cyjax monitors and analyses the initial access broker (IAB) market on the most prominent cybercriminal forums. As noted in Cyjax’s 2024 IAB market in review, it is almost certain that extortion groups, APTs, data brokers, and other threat groups use IABs to gain initial access to targeted networks. Though at first glance it is not immediately obvious how important the IAB market is to the threat landscape, Cyjax has conducted a deep analysis of public IAB listings and extortion group DLSs.

Building Cyber Resilience: Lessons from Recent High-Profile Attacks

It is human nature to think “oh, that will never happen to us!”. Whether it is a car accident, an IRS audit, or the loss of a job, we can never really feel immune from misfortune or adversity that may come our way. Much in the same way, the threat from cyberattacks is no longer a rare occurrence confined to large corporations. Organizations of all sizes face mounting challenges in an environment where cybercrime is increasingly sophisticated and disruptive.

The Ransomware Threat: Preparing Schools and Libraries for Ransomware Attacks

Ransomware attacks have emerged as a significant threat to educational institutions. Cybercriminals encrypt sensitive data and demand payment for its release, severely disrupting school operations and leading to exorbitant recovery costs for districts. With ransomware tactics continually evolving, the security of the entire U.S. education system is at risk.

The Flaw in "Secure" Systems: How ByBit's Attack Exploited Blind Trust

ByBit’s recent attack has exposed a critical flaw in how many exchanges approach security. The real-time transaction manipulation that took place wasn’t just an unfortunate event—it was a direct consequence of mispurposed security architectures that sophisticated attackers are all too ready to exploit.

5 Examples of Dependency Confusion Attacks

Are you still running your package pipeline on default settings and grabbing libraries straight from public repos? Big yikes. That’s rolling out the red carpet for dependency confusion attacks to drop shady code into your project. It isn’t uncommon. Nearly half (49%) of organizations are exposed to the risks of a dependency confusion attack because they make the same mistakes. But what exactly is dependency confusion, and how do these attacks manage to infiltrate?

10 Attack Vectors to Keep an Eye on in 2025

As the adage goes, time is money, and nowhere does this ring more true than in an evolving threat landscape. The faster companies detect, respond, and recover from data breaches, the better for their pockets. Using AI and security automation to shorten the breach lifecycle has been shown to save $2.2 million more on average compared to not employing these technologies.

Detect and respond to evolving attacks with Attacker Clustering

In today’s threat landscape, detecting and responding to distributed attacks is more challenging than ever. Attackers often operate in stealth, using coordinated strategies to blend into normal traffic and evade detection. To address this issue, Datadog Application Security Management (ASM) has a new clustering feature designed to identify and group attacker behaviors during distributed attacks.

Attacks Against Government Entities, Defense Sector, and Human Targets

In the first part of Trustwave SpiderLabs’ Russia-Ukraine war blog series, we gave a brief look at our major findings as well as the main differences between how Russia and Ukraine wage attacks in the digital frontlines. In this part of our series, we shed light on how both countries target government entities, defense organizations, and even human targets as part of their overall strategy to win the war.

What Is a Watering Hole Attack? Detection and Prevention

We already know that cybercriminals exploit the weakest link in your IT networks. The best defense against these exploits comes down to safeguarding the most vulnerable entry points. But what if the weakest link in your cybersecurity defense lies beyond your IT network itself?