Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A CISO's Guide to the DoW's New CSRMC Framework

The Department of War’s (DoW) new Cybersecurity Risk Management Construct (CSRMC) marks a watershed moment for cyber defense. This move confirms that static, checklist-based security is obsolete. To defend against modern threats, organizations must adopt the continuous and proactive posture management approach experts have been recommending for years.

6 Ways to Make Your Risk Assessments Land With Stakeholders

As businesses expand, so do their lists of third-party vendors—and with them, the number of risk factors and complexity. This increase means that security analysts are often overwhelmed by a growing number of vendor risk assessments. However, completing an assessment alone isn’t enough; its value depends on how effectively the results are communicated.

Salesforce Extortion Accelerates With New Leak Site

For months now, journalists and cybersecurity experts, including UpGuard, have been following the movements of the hacker collective “Scattered Lapsus$ Hunters,” a sort of supergroup of the already well-known cybercriminal entities ShinyHunters, Scattered Spider and Lapsus$. Now, this collective has launched a website where they can extort payment from entities in return for delisting and deleting their data.

UpGuard's Future: The Strategic Edge Your Security Team Needs

Security teams have struggled for far too long with a patchwork of siloed security tools, static compliance checks, and an increasingly adversarial threat landscape to continue down that path, especially when each of these challenges is making their organizations more vulnerable by the minute. Previously in this CRPM series, we’ve established that traditional security approaches are no longer adequate to keep pace against AI-driven attacks and the multi-pronged missions of cybercriminals today.

Grounded: The ARINC vMUSE Attack Disrupting Multiple Airports

The line between the digital and physical worlds blurs completely when a cyber attack results in widespread, tangible disruption. For thousands of travelers, this became a harsh reality when major European airports were forced to delay flights due to a ransomware attack targeting a vendor in the supply chain.

Shai-Hulud's True Lesson for CISOs: A Crisis of Communication

The Shai-Hulud worm wasn't just a sophisticated supply chain attack; its most important lesson was about a crisis of communication. The attack thrived in the organizational gap between security policy and the daily realities of software development, a gap that exists in most companies. Defending against the next software supply chain attack requires more than a new tool; it demands a strategic shift from imposing controls to forging a genuine partnership with engineering.

Beware the Sandworm: The Shai-Hulud Attack Explained

A new and dangerous self-replicating worm has been identified targeting the JavaScript repository NPM, infecting at least 187 code packages. The novel malware strain is engineered to steal credentials from developers and publish them to a new public GitHub repository. The worm automatically propagates itself by copying its code into the top 20 most popular packages maintained by the compromised user and publishing them as new versions.

Introducing UpGuard's Unified CRPM Platform

Cybersecurity isn’t a one-off battle. It’s a daily war fought on multiple fronts. Despite this, many security teams have been defending their organizations without cohesive visibility. Isolated security tools present a disjointed defense, one that is still fighting yesterday’s battles, but not today’s cyber threats.

Salesloft Drift Breach: What Happened and How Does It Affect Me?

A widespread supply chain attack has impacted hundreds of organizations through the marketing software-as-a-service (SaaS) product, Drift, owned by Salesloft. The campaign, attributed to a threat group tracked by Google as UNC6395, is believed to have occurred between August 8 and August 18, 2025. The attackers used stolen OAuth and refresh tokens associated with Drift's AI chat agent to access the systems of impacted companies.

The Hidden Costs of Your Fragmented Defenses

You’ve built an arsenal of security tools, but they aren’t even fighting the same war. Today, the average company balances 83 different security systems from 29 vendors. This massive tool sprawl has created a costly problem: fragmented defenses. Although each of your legacy endpoint solutions once served a specific purpose, their lack of integration and communication makes them insufficient today.