Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Dead Man's Scripts: The Security Risk of Forgotten Scheduled Tasks in Legacy Systems

There are ghosts in the machine. Not the poetic kind. I mean literal, running-code-with-root-access kind. The kind that was set up ten years ago by an admin who retired five jobs ago. The kind that still wakes up every night at 3:30 a.m.; processes something no one remembers, and then quietly vanishes into the system logs. Until, of course, something goes wrong—or someone takes advantage of it.

Preparing for the Quantum Future: Insights from the NCSC's PQC Migration Roadmap

A new era of inconceivably fast quantum machines is not far away, with computers almost ready to completely transform the way we solve problems, communicate, and compute. However, this transformation is not all positive, and the cybersecurity industry fears that functional quantum computers will be able to break even the strongest encryption we have today, rendering today's security infrastructure obsolete.

Future-Proof Endpoint Security in 2025: Why AV Alone Isn't Enough

The combination of remote work, increasingly evasive threats, AI-powered attack tools, and stricter compliance demands has outpaced the capabilities of traditional antivirus ‒ and even many modern EDR tools. As we move into 2025, the cybersecurity strategy must evolve in three critical directions: intelligence, automation, and alignment with compliance. Organizations can no longer rely on static detection.

5 must-haves in your first security hire + [Job posting Template]

Bringing on your first cybersecurity professional is a major milestone for any growing business. This strategic hire signifies that your company recognizes the increasing risks that come with growing your business and is committed to protecting and building trust with your customers. Because this is such an important role, knowing when to make this hire and how to find the ideal candidate is crucial. ‍

Surging Without Slowing: How We Mastered Japan's Golden Week Traffic Spike

Japan’s Golden Week is one of the most anticipated holiday seasons in the region, but for IT and network operations teams it’s a well-known pressure test. As businesses reopen after a full shutdown, millions of workers log in simultaneously at 9:00 AM local time, creating an intense and rapid traffic surge. At Cato Networks, we’ve come to anticipate this moment each year. But this time, our goal wasn’t just to ‘handle it’.

The Rise of Identity-Based Attacks and How Deception Can Help

Identity-based attacks have become the predominant vector for sophisticated threat actors targeting enterprise networks, particularly those using Microsoft Active Directory. Active Directory (AD), which serves as the authentication and authorization framework in over 90% of organizations, represents a critical attack surface that, when compromised, provides adversaries with extensive capabilities for lateral movement, privilege escalation, and data exfiltration.

Building a Ransomware Response Plan with Fidelis Elevate XDR: Technical Guide

Ransomware attacks are projected to occur every 2 seconds by 2031, up from every 11 seconds in 2021. Organizations paid approximately $813.55 million to ransomware groups in 2024. Email remains the primary attack vector, with malicious attachments twice as common as phishing links. Organizations with compromised backups face $3M average recovery costs, with 45% requiring more than a month to recover. Active ransomware groups increased 55% from Q1 2023 (29) to Q1 2024 (45).

How Fidelis Elevate Achieves Active Threat Detection

Modern security teams face a dual challenge: they’re bombarded with alerts while still missing critical signals that indicate real threats. Fidelis Active Threat Detection tackles this problem by correlating weak signals across multiple phases of attacks, transforming them into actionable intelligence. Let’s examine the technical mechanics behind this capability within the Fidelis Elevate platform.

Beware of Coinbase Scams

I got this Coinbase-related scam in my personal inbox last week. Coinbase is one of the world’s largest cryptocurrency exchange sites. So big and trusted, it’s the first cryptocurrency exchange to be added to the US S&P 500. I’ve been a Coinbase member from the beginning, so this email got my attention. I was pretty skeptical from the start, and upon further exploration, it was definitely a scam.

Warning: Phishing Kits Can Auto-Generate Tailored Login Pages

Commodity phishing kits are increasingly serving dynamically generated phishing pages, according to researchers at ESET. These kits allow unskilled threat actors to launch sophisticated attacks tailored to individual users. ESET describes one of these attacks, using a phishing email that informed the user of an unfamiliar sign-in to their account.