Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Homograph attacks: How hackers exploit look-alike domains

Several years ago, a security researcher discovered a vulnerability in Google Chrome that allowed fake domains to bypass the browser’s security measures. The researcher registered a domain that appeared as “xn--80ak6aa92e.com” but displayed as “apple.com” in the browser, demonstrating how easy it was to deceive users. This is just one example of what’s known as a homograph attack, or sometimes a ‘look-a-like domain’.

6 Must-Have WAF Features Insurance Companies Need in 2025

The insurance sector is in the middle of a cybersecurity storm. In 2024, Indusface analyzed over 495 million attacks targeting insurance websites and APIs. The findings were alarming: attackers are no longer spraying and praying; they’re precise, persistent, and increasingly automated. Here’s what the data showed: Insurance companies, which handle high volumes of personal and financial data, cannot afford security gaps.

SOAR on Azure Now Available

The market-leading momentum of our partnership and ongoing engineering roadmap with Microsoft continues! Splunk Security Orchestration, Automation and Response (SOAR) is now available as a native SaaS solution on Azure, enabling customers to even further improve their security posture and create greater digital resilience. Splunk SOAR on Azure acts as the efficiency engine for SOC analysts by connecting Azure services and third-party tools, automating workflows and tasks, and speeding response times.

12 WAF Myths Debunked - What You Really Need to Know

Web Application Firewalls (WAFs) play an important role in protecting websites and applications from common threats. But despite their growing adoption, WAFs are often surrounded by myths and misunderstandings that can lead to ineffective implementation or underutilization. In this blog, we debunk the most common myths about WAFs and reveal the truth behind what they can and cannot do.

From Chaos to Clarity: Building Full Network Visibility in Hybrid Cloud

As per Gartner’s report, cloud infrastructure spending surged past $88 billion by 2022, with organizations rapidly expanding their hybrid cloud presence. But as hybrid deployments grow, achieving full network visibility in hybrid cloud becomes one of the most pressing challenges. Hybrid networks—blending on-premises and cloud-based systems—introduce complex infrastructures and performance blind spots.

DevOps Pillars - Top 11 DevOps Principles for 2025

DevOps has become an important practice for companies looking to efficiently meet customers’ expectations, accelerate software delivery, and optimize resources. Companies that embrace the DevOps culture can smoothly merge their development and operations teams, resulting in faster releases and better development.

How to Use Amazon PPC Data to Drive Multi-Channel Business Growth

Businesses constantly look for innovative ways to expand their reach and increase sales. Amazon's Pay-Per-Click (PPC) advertising platform provides an invaluable resource for companies looking to enhance their marketing efforts. However, the true power of Amazon PPC lies in its ability to generate detailed data that can be leveraged to drive growth across multiple sales channels. By effectively analysing and using Amazon PPC data, businesses can create a comprehensive, multi-channel marketing strategy that supports sustainable business growth.

Digital supply chain security: How to secure your supply chain with DLP and Secude

Data loss prevention (DLP) software provides strong protection after data is stored, Secude provides Zero Trust protection before data is stored. Together, they secure your digital supply chain. Ensuring digital supply chain security is a fundamental part of the EU’s NIS2 Directive - and for good reason. In recent years, digital supply chains have become the main targets of cyberwarfare, with supply chain attacks rising 2,600% since 2018.