Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Next-Level Threat: Defending Against BrickStorm and the 393-Day Dwell Time

A new threat campaign, codenamed BrickStorm and attributed to a China nexus group tracked as UNC5221, has security researchers sounding the alarm. This is a highly sophisticated espionage operation, and its most staggering feature is the adversary’s patience. The astonishing average time they remain inside a victim’s network before being detected is well over a year—393 days to be exact.

Financial Institutions Need Privileged Access Management More Than Ever - Here's Why

What if one unauthorized access attempt ended up costing your bank millions? That’s exactly what happened to TransUnion in 2025, when hackers stole the personal data of 4.4 million people by abusing privileged credentials. This breach illustrates a harsh reality: privileged accounts are among the top targets for attackers, and data breaches in financial institutions are among the most costly across all industries.

LLM guardrails: Best practices for deploying LLM apps securely

Prompt guardrails are a common first line of defense against client-level LLM application attacks, such as prompt injection and context poisoning. They’re also a critical component of a full defense-in-depth strategy for LLM security at the infrastructure, supply chain, and application level. The specific guardrails that teams implement depend highly on use case, but they are typically designed to.

From Domain User to SYSTEM: Analyzing the NTLM LDAP Authentication Bypass Vulnerability (CVE-2025-54918)

In September 2025, a critical vulnerability (CVE-2025-54918) was discovered affecting Domain Controllers running LDAP or LDAPS services. This vulnerability allows attackers to elevate privileges from a standard domain user to SYSTEM level access, potentially compromising entire Active Directory environments.

The Future of Cloud Security: From CNAPP to CADR - Why ARMO Leads the Next Wave

The recently published 2025 Latio Cloud Security Market Report, authored by industry analyst James Berthoty, captures a major transformation: cloud security is leaving behind static visibility tools and moving toward runtime-driven risk reduction. The report traces five years of evolution – from dashboards full of misconfigurations to platforms that can detect, prioritize, and mitigate threats in real time. Six key insights define this new era.

How to Prevent Unauthorized Trackers and Cookies on Your Website

Every time someone clicks “accept cookies,” a new layer of risk begins. What appears to be a simple consent interaction can activate dozens of unseen third-party scripts that collect, share, or store user data beyond your control. For marketers, cookies power analytics and personalization. For privacy and security professionals, they often create compliance gaps and data-security blind spots.

Netwrix's Culture of Innovation- Unleashing AI

Netwrix’s culture of innovation thrives on curiosity, collaboration, and accountability. From integrating AI across development and customer experience to fostering cross-team creativity, innovation here moves sideways as much as it does down. During Innovation Week, leaders explore how AI and the 1Secure Platform are redefining data and identity security for the future.

Public Sector Ransomware Attacks Relentlessly Continue

In 2025, 36 years after the first ransomware attack was recorded, actors continue to zero in on the public sector, and there is no evidence they will slow down any time soon. In fact, our numbers suggest that ransomware attacks against government organizations are ramping up, causing crippling service outages, massive data loss, reputational damage, public distrust, and financial harm.

From Path Traversal to Supply Chain Compromise: Breaking MCP Server Hosting

We found a path traversal vulnerability in Smithery.ai that compromised over 3,000 MCP servers and exposed thousands of API keys. Here's how a single Docker build bug nearly triggered one of the largest AI supply chain attacks to date.