Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Workforce Passwordless Authentication: Beyond the Hype and Here to Stay

Let’s face it—passwords are a pain, especially for employees and contractors who deal with them daily. We all know that our so-called “secure” passwords often end up being something like “Password123,” “qwerty” or another easily forgotten combination—and those same passwords are frequently used between personal and corporate accounts. And even when we try to be smart about it, they are still the easiest way for hackers to get in.

Learn about API security risks with the new Snyk Learn Learning Path

Snyk Learn, our developer security education platform, now includes lessons on API security! Check out the new learning path that covers the OWASP Top 10 for API security risks. APIs power the modern web, connecting applications and services in ways that drive innovation and efficiency. However, with this interconnectivity comes significant security risks.

Data at Risk: 96% of Ransomware Attacks Involve Data Theft

A new report from Arctic Wolf has found that 96% of ransomware attacks now involve data theft as criminals seek to force victims to pay up. “As potential victims implemented more reliable backup and restoration processes, ransomware operators introduced data exfiltration as a means to apply additional pressure and protect their revenue streams,” Arctic Wolf says.

AI Literacy: A New Mandate Under the EU AI Act - What Your Organization Needs to Know

The European Union's AI Act is ushering in a new era of workplace requirements, with AI literacy taking center stage. Under Article 4, organizations must now ensure their workforce is sufficiently AI-literate - but what does this really mean for your organization? The AI Act requires organizations to provide adequate AI training to staff and operators. This training must account for technical knowledge, experience, educational background, and the context in which AI systems are used.

Understanding your WAF: How to address common gaps in web application security

Web application firewalls (WAFs) are one of the most commonly used tools that organizations deploy to protect their applications at runtime. By monitoring HTTP traffic and filtering out suspicious requests, WAFs act as a protective layer around an application that protects it from certain types of incoming threats. However, WAFs often fall short of expectations.

Vendor Responsiveness Solved: Soothing Your Third-Party Aches

Inefficiencies, like slow vendor responses, often plague security teams like a persistent headache. At first, it’s just a dull throb in the background. Yes, it’s annoying, but analysts often accept it as the way things are, pushing through the pain and getting the job done. However, over time, this headache intensifies.

Unveiling EncryptHub: Analysis of a multi-stage malware campaign

EncryptHub, a rising cybercriminal entity, has recently caught the attention of multiple threat intelligence teams, including our own (Outpost24’s KrakenLabs). While other reports have begun to shed light on this actor’s operations, our investigation goes a step further, uncovering previously unseen aspects of their infrastructure, tooling, and behavioral patterns.

Beyond the Endpoint: Why EDR/XDR Struggles in the Cloud

The cybersecurity landscape has dramatically shifted with the rise of cloud computing. While Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) have proven valuable in protecting traditional endpoints, the cloud introduces a new set of challenges. This post examines why these solutions, rooted in endpoint-centric approaches, may fall short in the cloud, highlighting the need for a new generation of cloud protection strategies designed for SaaS, IaaS, and PaaS environments.

Social Engineering Fraud: 7 Ways to Protect Your Customers

Most people know not to click on obvious spam emails, but today’s scams are polished, highly personalized, and AI-powered. Whether it’s a fake banking alert, a deepfake customer service call, or a cloned e-commerce website, social engineering fraud often spreads fast. When customers see familiar branding, hear a confident voice, or receive a message that appears to come from a trusted source, it’s easy to comply and get duped.