Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The invisible threat: Machine identity sprawl and expired certificates

One unmanaged machine identity—whether a TLS certificate, SSH key, code signing certificate, or API secret—that’s all it takes to crash your website, halt transactions, and leave customers complaining about you in the comments. No one is immune. In fact, 83 percent of organizations have experienced a certificate-related outage in the past 24 months. Even tech giants recently made headlines after expired renewals triggered hours of downtime and millions in lost revenue.

The Value of a Robust Vulnerability Management Program

Back before live security video feeds in homes, people would walk around at night checking to make sure they locked every window and door. They took these precautions because they knew that a single open lock gave burglars an opportunity to steal from them. For organizations, vulnerability management programs are a way to lock the doors against cybercriminals.

Minimize Risk, Maximize Control. The Role of Least Privilege Access Control

No principle is more frequently praised yet ignored than the principle of least privilege in cybersecurity. It’s the equivalent of locking your server room but handing everyone the master key “just in case.” Considering the current threat landscape, which is rife with credential leaks, ransomware, insider incidents, and careless automation, complacency is not only costly but also dangerous. And above all, reckless.

Hunting GTPDOOR: The case of the "Black Hat Positive"

Ben Reardon, Lead Researcher Corelight Labs / NOC crew I'm a researcher on the Labs team at Corelight and, for me, working in the Black Hat Network Operations Center (NOC) at the USA show in Las Vegas is up there as one of the most interesting and intense activities on the calendar.

0Click Attacks: When TTPs Resurface Across Platforms

If there’s one lesson security teams should take from recent disclosures, it’s this: AI agent attack techniques don’t disappear - they resurface, across vendors and platforms, with only small variations. What researchers called out months ago is showing up again, now in Salesforce as the ForcedLeak vulnerability.

Understanding the OWASP AI Maturity Assessment

Today, almost all organizations use AI in some way. But while it creates invaluable opportunities for innovation and efficiency, it also carries serious risks. Mitigating these risks and ensuring responsible AI adoption relies on mature AI models, guided by governance frameworks. The OWASP AI Maturity Assessment Model (AIMA) is one of the most practical. In this article, we’ll explore what it is, how it compares to other frameworks, and how organizations can use it to assess their AI maturity.

UAE Digital Assets: Why Banks and Payment Providers Must Act Now

The United Arab Emirates (UAE) has long established itself as one of the most forward-looking digital asset markets in the world. With an astute regulatory framework, growing institutional interest, and a thriving crypto-native community, the foundation has been laid for UAE banks and payments companies to take the next step in their digital asset journey.

Tackling the Modern WAF Challenge: Why Managed WAAP Is the Key to Effective Application Security

Organizations today face a continuous struggle to secure their web applications against threats that constantly evolve in the fast-paced digital landscape. The Web Application Firewall (WAF) serves as a primary line of defense against these threats; however, its management challenges often outweigh its security benefits, resulting in organizations not realizing the full value of their security investment.