Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CrowdStrike Falcon Platform Achieves Perfect Score in SE Labs' Most Comprehensive Ransomware Evaluation

In the 2024 SE Labs Enterprise Advanced Security (EDR) Ransomware Test, the CrowdStrike Falcon platform achieved a perfect score of 100% in detection, protection, and accuracy, earning the prestigious AAA Award for Advanced Security EDR Protection for the third time in a row. The Falcon platform detected and blocked 100% of ransomware files and protected endpoints across multiple stages during all simulated ransomware attacks.

Stating the Obvious: Vulns On the Rise in 2025

Happy New Year! As we usher in a year with some pleasant mathematical properties, I wanted to take a brief look back at one of the stories that was most interesting to me as a security data nerd from last year: our dependency on the National Institute of Standards and Technologies’s (NIST) National Vulnerability Database(NVD), and what the degradation in service has meant to the flow of information about new CVEs. TL:DR.

Common Mistakes Companies Make When Implementing GDPR Policies

The General Data Protection Regulation (GDPR) has set a high standard for data protection and privacy in the European Union, impacting businesses worldwide. While most companies recognize the importance of compliance, many make critical mistakes during implementation, leaving them vulnerable to fines and reputational damage. Here are some of the most common pitfalls and how to avoid them.

How Apple is Battling Phishing Scams and Protecting Your Personal Data

The digital world is now facing a serious challenge of phishing where fraudsters employ fake emails, websites or links to get confidential data which can result into great losses if not well handled. Apple, however, has taken several steps to protect users from these attacks.

AI-Powered Attacks Surge: 1,025% Jump in Vulnerabilities, 99% are API related

Wallarm's 2025 API ThreatStats Report offers a sweeping look at how AI deployments drive a surge in security risks. In 2024, Wallarm researchers discovered 439 AI-related CVEs-up an astonishing 1,025% from the prior year. Nearly all these flaws, 99%, point back to insecure or mismanaged APIs.

Digital Fingerprinting in Cybersecurity: An Advanced Guide

Digital fingerprinting refers to the process of identifying and profiling a device, system, or user based on a collection of unique characteristics and behaviors emitted during their interaction with a network or digital environment. These identifiers—often passive byproducts of normal operations—can include configuration settings, protocol behaviors, device metadata, and software versions.

How to Detect and Prevent Corporate Espionage Attacks

14 years in prison and a $200,000 fine. That’s what it cost a Michigan chemist caught stealing trade secrets from Coca-Cola and Eastman Chemical Company. And no, she wasn’t an outsider—she was a trusted Principal Engineer with legitimate access to these technologies worth $120 million in development costs . Every year, companies fall victim and lose billions to corporate espionage attacks, with many attacks going undetected for months or even years.

Cracking the Giant: How ODAT Challenges Oracle, the King of Databases

In the past decade, Oracle Database (Oracle DB) has reigned supreme in the competitive arena of database engine popularity ranking as shown in Figure 1 and Figure 2. This pervasiveness has led Oracle Database to be trusted by Fortune 500 companies (e.g. Netflix, LinkedIn, eBay, etc.) to house, process, and safeguard their critical data.

Unify your identity platform: Address the IAM trends

“3,205 reported data compromises in the U.S. in 2023, a 78% increase over 2022. 1 In our opinion, this doesn’t even account for unreported breaches. So, it’s no secret that cyber threats are increasing exponentially. According to Gartner, 70% of breached organizations reported significant business disruption. 1 Clearly, the more we include technology in our lives, the more threat actors will exploit digital vulnerabilities that can stall or even shut down an organization.