Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI Risk Visibility: The Foundation of Responsible AI Governance

‍General-purpose AI (GenAI) and other artificial intelligence (AI) systems are now completely embedded within business processes across the market. The once purely imagined technology is significantly influencing operations and reshaping the very processes under which high-level decisions are made.

Corelight Named a Leader in NAV Solutions by Forrester

We are proud to announce that Corelight has been recognized as a Leader in The Forrester Wave: Network Analysis And Visibility (NAV) Solutions, Q4 2025. We believe this recognition reflects our focused innovation and the expanding capabilities of our Open NDR platform.

From Heritage to Horizon: The Evolution and Innovation of New Securonix To Become 6X Leader in Gartner MQ for SIEM

When Gartner released the 2025 Magic Quadrant for SIEM this week, I took a moment to pause and reflect. For the sixth year in a row, Securonix is recognized as a Leader. Milestones like this don’t happen by accident. They’re the result of relentless effort, bold decisions, and an unwavering belief in the direction we chose.

Six Times a Leader, Critics and Audiences Agree

Today I am thrilled to announce that Securonix has, once again, been positioned in the Leaders Quadrant of the 2025 Gartner Magic Quadrant for SIEM. Six times running. That kind of consistency doesn’t happen by chance. In a market full of trend cycles and flavor-of-the-month solutions, we strongly feel being recognized as a Leader time after time is simple: execute, innovate, earn customer trust, and show up every day for the security community.

The Power of Detection Engineering & Custom Parsers

In the fast-paced world of cybersecurity, detection engineering is a growing discipline that helps organizations stay ahead of threats. But success isn’t just about having the right tools or detection workflows in place—it’s about making sure those tools speak the same language to help you scale your efforts and better understand your overall security posture. This is where parsers play a critical role.

Building a Privacy-First AI Stack for Highly Regulated Industries

In a bid to quickly join the AI race, enterprises are steadily pouring time and money to adopt it. While designing a new AI tool, security and compliance are often an afterthought for developers and product managers. For industries that don’t handle sensitive data, AI adoption does not necessitate embedding strong privacy controls. However, highly regulated sectors like healthcare, finance, or government defence contractors can’t afford to launch without adhering to regulations.

Making Cyber Risk Intelligence Easier to Understand, Explain, and Act On

Helping customers understand rating changes has always been a core commitment at Bitsight. A rating shift can spark questions from executives, board members, or regulators, and security leaders must be ready to answer with clarity and confidence. That’s why we’ve introduced new updates to the Bitsight platform designed to make our cyber risk intelligence solutions more actionable.

Oracle E-Business Suite Zero-Day (CVE-2025-61882) - Post-Incident Technical Brief

In late 2025, a critical pre-authentication remote-code-execution vulnerability (tracked as CVE-2025-61882) in Oracle E-Business Suite (EBS)— specifically the Concurrent Processing / BI-Publisher integration — was exploited in a large-scale extortion/data-theft campaign attributed to the Cl0p/Clop extortion cluster. Attackers abused the flaw to run attacker-controlled XSLT/Java payloads, gain remote code execution on EBS application servers, and exfiltrate sensitive data for extortion.

Which Solutions Detect Unauthorized JavaScript Trackers in Real-Time?

According to Web Almanac, the top 1,000 websites load an average of 43 third-party domains on mobile and 53 on desktop, each a potential entry point for supply-chain tampering. A separate analysis found that most enterprise sites include 12 third-party and 3 fourth-party scripts in sensitive user journeys. That’s 15 external execution paths per transaction, and every one of them runs in the same browser as your checkout.