Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Unpacking the Recent npm Supply Chain Attack: What We Know So Far

The software supply chain has once again come under fire, with npm — the world’s largest package ecosystem — at the center of one of the most significant compromises to date. Recent findings suggest that attackers successfully hijacked a maintainer account through phishing, injecting malicious code into popular open-source packages with billions of weekly downloads.

Girona FC Kicks Off Security Partnership with WatchGuard

In an era where professional sports organizations increasingly rely on digital infrastructure, the risks associated with cyber threats are greater than ever. Girona FC, one of LaLiga’s rising professional football clubs, has taken a significant step to enhance its cybersecurity posture by partnering with WatchGuard Technologies. This move reflects the Club’s broader commitment to digital resilience and operational security.

Navigating the ASPM Landscape: Why Veracode was Named a Leader in the IDC MarketScape

The application security landscape is undergoing a profound transformation. Modern development practices, characterized by cloud-native architecture, microservices, and AI-assisted coding, have exponentially expanded the attack surface. In response, organizations are grappling with an overwhelming volume of vulnerabilities from a disconnected array of security tools. This alert fatigue makes it nearly impossible to distinguish real threats from noise.

Zenity Named a 2025 Cool Vendor in Gartner's Agentic AI TRiSM Report

Your security teams are facing an unprecedented challenge. AI agents are spreading across enterprises faster than anyone anticipated, from Microsoft 365 Copilot processing sensitive emails to custom agents built on AWS Bedrock accessing critical databases. Over 80% of Fortune 500 companies are already deploying these autonomous systems, oftentimes without adequate security guardrails. The result is a rapidly expanding attack surface that conventional security tools simply cannot see or secure.

AsyncRAT in Action: Fileless Malware Techniques and Analysis of a Remote Access Trojan

Fileless malware continues to evade modern defenses due to its stealthy nature and reliance on legitimate system tools for execution. This approach bypasses traditional disk-based detection by operating in memory, making these threats harder to detect, analyze, and eradicate. A recent incident culminated in the deployment of AsyncRAT, a powerful Remote Access Trojan (RAT), through a multi-stage fileless loader. In this blog, we share some of the key takeaways from this investigation.

Bitsight GIA Update: How Gen-AI and LLMs Get You Faster (and Better) Entity Mapping

Bitsight’s mission to keep evolving the capability of our data engine through AI enhancements hit a new milestone today. The latest addition is a new entity mapping capability added to Bitsight AI and the data engine, which uses GenAI agents to create more complete and consistent sets of identifiers for organizations scanned and added to Bitsight’s entity inventory.

EP 15 - Why banks need to treat machine identities like VIPs

In this episode of Security Matters, host David Puner speaks with Andy Parsons, CyberArk’s Director of EMEA Financial Services and Insurance, whose career spans from the British Army to CISO and CTO roles in global financial institutions. Andy shares hard-earned lessons on leadership, risk management, and the evolving cybersecurity landscape in banking—from insider threats to machine identity governance and the rise of agentic AI.

Top 7 Privileged Access Management Solutions

Summary: Privileged Access Management (PAM) is essential to securing today’s complex IT environments, as organizations rapidly adopt multi-cloud infrastructures, DevOps practices and hybrid work models. Yet, complexity remains a major barrier – 68% of IT leaders say their current PAM solution includes unnecessary features they rarely use.

JFrog and GitHub: Next-Level DevSecOps

Most DevSecOps pipelines have a gap: source code security and binary security are handled in separate silos. This creates blind spots, slows teams down, and increases risk. At swampUP 2025, we’re unveiling the next evolution of the JFrog and GitHub integration, a deeply integrated DevSecOps experience that unifies best-of-breed code and binary platforms.