Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Using MITRE ATT&CK for Incident Response Playbooks

A structured approach to incident response enables you to create consistently repeatable processes. Your incident response playbook defines responsibilities and guides your security team through a list of activities to reduce uncertainty if or when an incident occurs. MITRE ATT&CK Framework outlines the tactics and techniques that threat actors use during different stages of an attack.

Testing Authorization Policies in CI/CD Environments: Best Practices

When you're nearing bringing a new update to production, you may rather not want to realize that everyone and anyone has complete open access to sensitive data, just before you're about to deliver the update. Misconfiguring or properly not configuring an authorization policy could lead to a scenario just like that. Things move fast in the CI/CD environment, with code changes and constant deployments, so it's not hard to see how a security mistake can slip under the radar. But when it does, you can expect security breaches, regulatory violations, and huge losses, are swiftly follow. And you definitely want to prevent those.

How to Maintain Network Security During a NetSuite Implementation

NetSuite is one of the most secure Enterprise Resource Planning (ERP) software systems available, including multi-factor authentication and token-based application authentication. However, implementing NetSuite is often a long process that can entail numerous contractors and other parties working within your system. During the transfer and adjustment period, you must take extra care with your data security to ensure that everything is moved properly and no data is lost. Today, we'll explore how you can ensure that your data is safe during this critical transition period.

IT Staffing Challenges for MSPs: How to Build a Skilled and Secure Workforce

Managed Service Providers (MSPs) are playing an increasingly critical role in handling IT operations, cybersecurity, and cloud infrastructure for businesses. This reliance has created a demand for highly skilled professionals capable of maintaining security, managing networks, and adapting to evolving technologies. However, MSPs face significant challenges in attracting and retaining top IT talent, making workforce stability a pressing concern.

Google Cloud Armor Vs Cloudflare WAF

Google Cloud Armor is a web application firewall (WAF) service from Google Cloud Platform (GCP) that safeguards web applications against DDoS attacks and security threats. It integrates seamlessly with the Google Cloud HTTP Load Balancer, providing protection for Google Cloud applications against internet-based attacks.

Arctic Wolf Observes Authentication Bypass Exploitation Attempts Targeting SonicWall Firewalls (CVE-2024-53704)

On February 10, 2025, Bishop Fox published technical details and proof-of-concept (PoC) exploit code for CVE-2024-53704, a high-severity authentication bypass vulnerability caused by a flaw in the SSLVPN authentication mechanism in SonicOS, the operating system used by SonicWall firewalls. Shortly after the PoC was made public, Arctic Wolf began observing exploitation attempts of this vulnerability in the threat landscape.

The Threat Within: Understanding the Role of Malicious Insiders in Cyberattacks

The Financial Industry Regulatory Authority (FINRA) recently released the 2025 FINRA Annual Regulatory Oversight Report, which observed an increase in the variety, frequency, and sophistication of insider threats by threat groups.

Love, Lies, and Loss: The Rise of Romance Scams

While Valentine’s Day is a celebration of love, it’s also a time to be cautious. Scammers prey on our most vulnerable emotions, manipulating those longing for connection. It’s not just about money—it’s about trust, hope, and heartbreak. Protect yourself and your loved ones by staying informed, recognizing the warning signs, and keeping your heart safe from fraud. If something feels too good to be true, trust your instincts. Love is real, but so are the dangers of deception.