Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

DNS Security: Today's Most Common DNS Risks and Threats

Domain Name System (DNS) is a critical Internet service. DNS simplifies the process of finding Internet resources by resolving user-friendly domain names, such as splunk.com, into machine-readable IP addresses like 192.168.1.1. Many sophisticated cyberattacks rely on DNS activities. Let’s review the risks DNS services face and what organizations can do to guard against DNS attacks. We’ll cover the following critical DNS security topics.

What Are OWASP Top 10 Threats & When Will the Top 10 Be Updated?

The OWASP Top 10 is a security research project that outlines the ten most critical security risks to web applications. Published by the Open Worldwide Application Security Project (OWASP), it serves as a widely recognized benchmark for web application security. The list is compiled from data gathered by security experts and organizations worldwide, based on the prevalence, detectability, and impact of various vulnerabilities.

Corelight Recognized as a Leader in the 2025 Gartner Magic Quadrant for Network Detection and Response

Network Detection and Response (NDR) has emerged as a must-have capability of modern security operations (SecOps). NDR provides deep visibility, detection of advanced threats that evade other security tools, and rapid response capabilities to address the SecOps challenges of incomplete visibility, detection gaps, high SIEM and storage costs, and tool sprawl that impact accuracy, speed, and efficiency.

The Multi-Agent System: A New Era for SecOps

Security teams face mounting pressure to defend against sophisticated cyber threats. Traditional automation strategies are often rigid, reactive, and lack the ability to scale effectively. Many SOCs already have access to generative AI to assist with simple tasks and now Torq has brought agentic AI into the mix — which thinks, acts, and learns autonomously to handle security risks. What’s next?

How ASPM Analytics Empower CISOs with Real-Time Security Insights

Understanding the security posture of your application stack is increasingly important. Exploitation of vulnerabilities surpassed phishing as the known initial access vectors in non-Error, non-Misuse breaches, according to the Verizon 2025 Data Breach Investigations Report. As a CISO or security leader, are you prepared for this shift in the industry?

Scammers Exploit Uncertainty Surrounding US Tariffs

Cybersecurity experts are warning that scammers are taking advantage of uncertainty surrounding the U.S. administration’s tariff policies, CNBC reports. Fraudsters may send texts or emails posing as retailers, delivery companies or government agencies, requesting tariff-related payments for purchases and deliveries. James Lee, president of the Identity Theft Resource Center, noted that scammers frequently take advantage of new government policies to launch phishing attacks.

Capital One Customers Targeted By Credential Harvesting Phishing Campaign

The KnowBe4 Threat Lab has identified an active phishing campaign impersonating Capital One. The attacks are sent from compromised email accounts to help them evade reputation-based detection by native security and secure email gateways (SEGs). Once delivered, the attacks use stylized HTML templates and brand impersonation to trick the recipient into believing the communications are legitimate. Recipients who fall victim are directed to credential-harvesting websites.

Understanding the Risks of Remote Monitoring and Management Tools

The IT environment is evolving. Organizations have embraced hybrid work models, expanded their operations and personnel footprints, and digitalized their processes and capabilities. And those in charge of these now sprawling environments must deal with the increasingly complicated task of keeping endpoints, users, and more both operational and secure.

How NIS2 Is Forcing Companies to Rethink Their Security Architecture

The NIS2 Directive is raising the bar for cybersecurity compliance across the EU, pushing companies to reevaluate and strengthen their entire security architecture. With stricter requirements, broader sector coverage, and hefty penalties for non-compliance, many organizations are feeling unprepared for the level of transparency and resilience now expected. This shift is creating urgent challenges-especially for businesses with fragmented systems, limited incident response plans, or outdated infrastructure.