Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Mastering PowerShell Sleep for Script Management

The Start-Sleep cmdlet in PowerShell pauses the execution of a script and waits for a specified amount of time. Strategically using pauses can help ensure smooth functionality and prevent errors, especially in scripts that depend on external systems or events. Here are three of the top reasons you might need to use a PowerShell pause command.

An Overview of the MGM Cyber Attack

If you have ever been to a Las Vegas casino, then you know that they are literally money-making machines as people bet money on a variety of games on a continuous basis. Modern casinos exemplify digitally transformed businesses, with customers engaging through multiple digital channels, from gaming systems to mobile apps and loyalty programs.

Top Six Most Dangerous Vulnerabilities in C and C++

C and C++ programming are notorious for being bug-prone. Let’s look at the most dangerous software weaknesses in 2024 that are relevant for C and C++, so that you know what type of issues to test your code against in 2025. We examined the 2024 CWE Top 25 Most Dangerous Software Weaknesses list developed by Common Weakness Enumeration (CWE) and identified weaknesses relevant to C/C++. These weaknesses can become vulnerabilities. We explained how they occur and how you can uncover them.

Overcoming Security Challenges in Real-Time APIs

Speed is everything in the modern business world. Our attention spans are shorter than ever, consumers demand short and seamless interactions, and the slightest delay in service delivery can see organizations fall far behind their competitors. This is why real-time APIs are so important; they enable systems to communicate and exchange data with minimal delay, allowing for near-instantaneous updates and interactions to create a more dynamic and responsive user experience.

Reshaping IGA for the Modern Enterprise: Welcome Zilla Security to CyberArk

This week, we announced an important development in our journey to deliver the industry’s most powerful, comprehensive identity security platform. CyberArk has acquired Zilla Security, a leader in modern Identity Governance and Administration (IGA) solutions, bringing their cutting-edge, AI-powered technology into the fold of our industry-leading platform.

The startup guide to making your first security hire

As a startup founder, it can be difficult to know when it’s time to expand your team. Sales and engineering were likely your top priority hires to fuel your product development and growth. But knowing where to focus next is often murky for early-stage startups. As you build your company, it becomes increasingly clear that security and compliance are vital parts of a successful business, but hiring for them can feel like a luxury instead of a necessity. ‍

The risks of waiting on compliance

Startup founders constantly face competing demands as they build and scale their businesses. Engineering, product design, and sales all have legitimate claims to be the most urgent priority and sole focus of attention. ‍ These pressures lead many founders to defer security and compliance investments until later. With small teams and limited financial resources, founders top priorities are building their product and acquiring their first customers.

New Research: Ransomware Data Extortion Skyrocketing

Data theft extortion attacks increased by 46% in the fourth quarter of 2024, according to a new report from Nuspire. These incidents have become a routine part of ransomware attacks, since the threat of a data breach puts additional pressure on victims to pay the ransom. Ransomware gangs published stolen data on leak sites more than 2,200 times during Q4 2024. The finance and insurance industry saw the sharpest rise in data theft extortion last quarter.

Understand and detect MITRE Caldera with Zeek

MITRE’s Caldera is a cybersecurity platform developed to simulate adversarial tactics, techniques, and procedures (TTPs). Built upon the MITRE ATT&CK framework, Caldera is an open-source tool designed to help cybersecurity professionals and organizations assess their defenses, uncover vulnerabilities, and enhance their overall security posture. By emulating real-world cyber threats, Caldera enables blue teams to test detection and response mechanisms under realistic conditions.