Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

When Firewalls Age Out: What the Akira Attack Can Teach Us About Lifecycle Security

Cyberattacks evolve faster than aging infrastructure can keep up, and expired hardware is one of the biggest blind spots organizations face today. The recent Akira ransomware campaign targeting SonicWall VPNs is a powerful reminder of what happens when devices slip out of support.

Beyond manual forensics: Booking.com's approach to orchestrating incident response

Browser history can play a critical role in incident response, from helping analysts reconstruct user activity and validating alerts, to uncovering malicious behavior. But retrieving raw artifacts from endpoints is often slow, manual, and inconsistent. In this technical session, Ahmad Aziz, Security Engineer II at Booking.com, will share his winning entry from the 2024 “You Did WHAT?! With Tines” (YDWWT) competition: a fully automated workflow that pulls raw browser history artifacts from devices using CrowdStrike and prepares them for offline forensic analysis.

Episode 4: Bring automation to the heart of your privileged access workflows with PAM360

Enterprise security isn’t just about controlling who gets access. It’s about making those access workflows efficient, consistent, and free from error. In this episode of the PAM Masterclass, we’ll walk you through how PAM360 transforms repetitive admin work into automated, policy-driven workflows. It covers how to grant access only when required, revoke it automatically, and manage critical administrative tasks without manual effort, all while strengthening the organization’s security posture.

When Attackers Weaponize AI and Defenders Fight Back with Smarter Remediation

Artificial intelligence is transforming cybersecurity, and not always for the better. Attackers are now weaponizing AI to speed up reconnaissance, create exploit code, and bypass traditional defenses. Security teams can’t afford to rely on outdated vulnerability management practices. In this webinar, Scott Kuffer (COO, Nucleus Security) and Corey Brunkow (Director of Federal Operations, Horizon3.ai) break down how AI is changing the threat landscape and what defenders can do to stay ahead.

Zero Assumptions: A Data Science & Threat Intel Roundtable

How do data science and threat intelligence intersect to strengthen defenses in today’s evolving cyber landscape? Join us this Wednesday, September 24 at 10 AM ET for a special edition of Arctic Wolf SOCast: Zero Assumptions, where our experts will break down how advanced analytics and threat research work hand-in-hand to outpace attackers. Featuring.

Tools That Help You View Difficult Content Safely

When your job involves looking at distressing or graphic material, there are ways to reduce the impact. Therapist Eve Parmiter shares practical tools and techniques – like muting audio, using blur overlays, or limiting your screen view – that help professionals stay regulated while still doing the work.#CyberSecurity.

Have we reached true anonymous AI? #cybersecurity #ai

PromptLock ransomware represents a chilling evolution: AI that makes real-time decisions about your data. Unlike traditional ransomware that blindly encrypts everything, this malware uses a locally-hosted LLM to analyze file contents and decide whether to exfiltrate or encrypt based on what it finds. It's essentially agentic AI making autonomous threat decisions.