Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

5 Ways Cyber Threat Intelligence Boosts Cyber Risk Prioritization

As cyber risk leaders are called to balance the responsibility of managing risk in the face of both broader attack surfaces and increased regulatory and budgetary scrutiny, prioritization of work is everything. Cybersecurity resources are finite, while the vulnerabilities and threats just keep growing. The best way for modern security programs to keep up is by directing resources to the risks that matter most to their specific organizations.

Unlocking New Jailbreaks with AI Explainability

In this post, we introduce our “Adversarial AI Explainability” research, a term we use to describe the intersection of AI explainability and adversarial attacks on Large Language Models (LLMs). Much like using an MRI to understand how a human brain might be fooled, we aim to decipher how LLMs can be manipulated.

Whole-of-State Cybersecurity: A Unified Approach to Protecting Government

In today’s era, where the digital landscape is as critical as the physical, the urgency to adapt and reinforce our cybersecurity infrastructure is more pressing than ever. For government operations, where data breaches and cyberattacks frequently make the headlines, adopting a whole-of-state approach to cybersecurity isn’t just a precaution—it’s a strategic imperative to protect our communities and safeguard our future.

Threat hunting in Elastic with JOINs!

Elastic’s piped query language, ES|QL, brings joins to the party Threat hunters rejoice! Have you been looking for a way to join data with the speed and power of Elastic? Well, we heard you! Elastic can now join data sources with a new function for the piped query language, ES|QL (Elasticsearch Query Language). This will enable robust searches that range from advanced behavior detections to alert triage and of course, threat hunting.

A Brief History of Threat Intelligence: How We Got Here

Although cyber threat intelligence has become increasingly important in the modern era, driven by the exponential rise in cybercrime and global dependence on digital infrastructure, the foundational concept of threat intelligence is not a recent development. In 2024, just over four in ten businesses (43%) and three in ten charities (30%) reported experiencing some form of cybersecurity breach or attack in the previous 12 months, highlighting the scale of today’s threat landscape.

What Is Device Code Phishing?

Ever since Microsoft’s initial announcement on February 13, 2025, about a Russian nation-state phishing campaign using "device code phishing," many people have been wondering what it is. This post will tell you what device code phishing is and how to defend against it. Here are some other related reports involving the recently reported device code phishing attacks.

Criminals Exploit the Death of Pope Francis to Launch Scams

Scammers are exploiting the death of Pope Francis to launch social engineering attacks, according to researchers at Check Point. The researchers note that threat actors often take advantage of high-profile tragedies and crises to exploit victims’ emotions. “They typically begin with disinformation campaigns on social media platforms like Instagram, TikTok, or Facebook, uploading fake images generated by AI,” the researchers write.

No More Black Friday Fire Drills: How Elkjøp Transformed Retail IT with Cato

Black Friday is retail’s biggest moment—and retail IT’s biggest challenge. Spikes in traffic, strained systems, and the constant fear of outages turn what should be a commercial win into an operational war room. For many retailers, it’s a time of sleepless nights, emergency vendor calls, and systems pushed to their breaking point. But it doesn’t have to be this way.

A Complete Guide to Fintech Cloud Security

With the pace of growth in financial services accelerating, fintech is, in real terms, the new normal, not the new disruptor. Cloud technology has fueled this revolution, equipping companies with tools that can be scaled quickly in response to customer demands and market needs, and enabling cost savings that can be passed on to these customers.

What is the Ideal Penetration Testing Frequency for You?

Security testing hasn’t just fallen behind—it’s playing the wrong game in a world where product teams ship updates like software streams, testing once a year is akin to locking the doors after the party has ended. It’s not just late; it’s irrelevant. Most orgs still treat pentests like performance reviews: formal, infrequent, and disconnected from the day-to-day reality. But risk doesn’t work on an annual schedule.