Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Aurora Endpoint Security Difference: Ushering in a New Dawn for Cybersecurity

Today, Arctic Wolf successfully completed the acquisition of BlackBerry’s Cylance endpoint security assets. With this acquisition, we are thrilled to welcome hundreds of new partners and thousands of customers to The Pack. Additionally, we are excited to welcome almost 400 new employees who will join Arctic Wolf offices around the globe.

Top 5 Strategies to Reduce Dwell Time with XDR: Accelerating Threat Detection and Response

Cyber adversaries operate with one goal in mind—stealth. The longer they go undetected in an environment, the more damage they can cause. Dwell time is the total amount of time that a threat remains unnoticed in a system, from initial compromise to discovery. According to the most recent threat reports, the average dwell time for undetected breaches has reduced but remains at 10-15 days, providing attackers enough time to exfiltrate data, launch ransomware, or establish persistent access.

DeepSeek DDoS: Why AI Needs Machine Identity Security

Imagine a sleek, high-tech sports car racing downhill without brakes. Now, imagine that car is actually the AI driving your business. Powerful yet precariously close to catastrophe. That’s why, as we accelerate AI adoption, including AI agents, we can’t afford to overlook security guardrails. This fact was front and center during the recent “large-scale cyberattack” on DeepSeek, a strategic open-source AI player from China that’s been disrupting the global AI space.

Behind the scenes of Elastic Security's generative AI features

A quantitative approach to prompt tuning and LLM evaluation Elastic has long been developing machine learning (ML) and AI-powered security detections. We constantly bring in new technologies when available to help make our users’ lives easier. So, with the rise of generative AI (GenAI), we have developed even more Elastic Security features to use this powerful, new technology. Among those are.

Materially Missing the Mark With Cyber Event Disclosure Rules

A little over a year ago, the US SEC’s rules on cybersecurity incident disclosures were enacted, mandating that all publicly traded companies report material cyber events within four days after they had been determined as such unless exempted for national security or safety reasons. The rationale behind these rulings was that they would provide investors and relevant stakeholders with the information necessary to make more informed decisions, thereby leading to more realistically priced options.

Warning: Phishing Campaign Targets Germany with New Malware

Researchers at Cisco Talos warn that a new phishing campaign is targeting users in Germany and Poland in an attempt to deliver several strains of malware, including a new backdoor dubbed “TorNet.” The phishing emails purport to be fake money transfer confirmations from financial institutions or phony order receipts from manufacturing and logistics companies.

Preserving content provenance by integrating Content Credentials into Cloudflare Images

Today, we are thrilled to announce the integration of the Coalition for Content Provenance and Authenticity (C2PA) provenance standard into Cloudflare Images. Content creators and publishers can seamlessly preserve the entire provenance chain — from how an image was created and by whom, to every subsequent edit — across the Cloudflare network.

Securing Critical Infrastructure: How KeeperPAM's Zero-Trust Architecture Protects Industrial Control Systems

The Cybersecurity and Infrastructure Security Agency (CISA) has recognized that Industrial Control Systems (ICS) and Operational Technology (OT) environments represent one of the largest threats to American critical infrastructure. The increasing convergence of IT and OT systems, combined with the rise of ransomware attacks targeting critical infrastructure and the growing sophistication of nation-state threats, has created unprecedented security challenges.