Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How To Get a Child an IP PIN and Protect Their Identity

An IP PIN is a six-digit code that protects US residents from fraudulent tax submissions. Electronic tax filings require an IP PIN and Social Security Number, allowing the former to act as a form of two-factor authentication. While IP PINs are primarily used by adults, they can also protect minors from having their identities used by fraudulent actors. A child without an IP PIN is at risk of having their identity used to file fake taxes.

SafeBreach Coverage for US CERT AA25-141B (Sticky Werewolf)

On May 21, 2025, the FBI and CISA released a joint Cybersecurity Advisory (CSA), designated AA25-141B, warning about the rise in attacks leveraging LummaC2, attributed to a threat group referred to internally as Sticky Werewolf, this cyber espionage campaign has used LummaC2 malware since at least April 2023 to target Russian and Belarusian government agencies, science centers, and aviation manufacturers.

Resolving a request smuggling vulnerability in Pingora

On April 11, 2025 09:20 UTC, Cloudflare was notified via its Bug Bounty Program of a request smuggling vulnerability (CVE-2025-4366) in the Pingora OSS framework discovered by a security researcher experimenting to find exploits using Cloudflare’s Content Delivery Network (CDN) free tier which serves some cached assets via Pingora.

Exploited! Grafana CVE-2025-4123 - Open Redirect & Stored XSS Give Attackers a Springboard Into Your Cloud

Grafana—the cloud-native observability dashboard almost every DevOps team relies on—rushed out Grafana 12.0.0-security-01 yesterday to squash CVE-2025-4123, a high-severity open-redirect and stored cross-site scripting (XSS) vulnerability. When chained with the popular Grafana Image Renderer plugin the bug escalates to a full-read server-side request forgery (SSRF), exposing cloud-metadata services and internal APIs.

What is an External API?

In today’s highly interconnected digital ecosystem, external APIs have become indispensable for organizations looking to enhance their capabilities and remain competitive. These interfaces allow businesses to seamlessly integrate third-party services, data, and functionalities into their applications, unlocking many possibilities. However, while external APIs offer immense opportunities, they also come with significant challenges, especially regarding security, governance, and risk management.

What is API Latency?

API latency is often an unnoticed threat in the vast digital landscape, quietly wreaking havoc on system performance, user experience, and—perhaps most critically—security. For security leaders, understanding and mitigating API latency should be more than a performance enhancement goal; it’s a foundational part of any robust cybersecurity strategy.

CrowdStrike Collaborates with U.S. Department of Justice on DanaBot Takedown

Effective collaboration is essential when confronting today's sophisticated cyber adversaries, particularly those operating with state tolerance or direction. At CrowdStrike, we routinely work alongside law enforcement agencies and industry partners to identify, monitor, and mitigate cyber threats. Recently, we provided technical assistance to the U.S.

CrowdStrike Leads in GigaOm Radar for Identity Threat Detection and Response

According to GigaOm, CrowdStrike is recognized as the most mature and complete platform in the Identity Threat Detection and Response (ITDR) category. In the 2025 GigaOm Radar Report for ITDR, we are the only vendor with perfect 5/5 scores across all Emerging Feature categories, including AI-Enhanced SecOps/CoPilot and Non-Human Identity Security, and tied for the highest average scores in both Key Feature and Business criteria.

ARMO Now Supports GKE Autopilot Clusters

We’re excited to announce that ARMO now fully supports Google Kubernetes Engine (GKE) Autopilot clusters! This update comes in response to strong demand from our user community and enterprise customers, many of whom are embracing Autopilot for its simplicity and operational efficiency — while still requiring deep, real-time security observability and enforcement. Get your Kubernetes Security Checklist now.