Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Scattered Spider Unmasked: How an identity-focused APT is redefining cyber threats

Scattered Spider has emerged as one of the most disruptive advanced persistent threats in recent years, breaching major organizations across telecom, gaming, transportation, and retail. In the last few months, the group has escalated its activity—targeting financial services and launching coordinated ransomware campaigns that have crippled operations and exposed sensitive data.

Minna Bank Taps Fireblocks to Explore Stablecoins and Web3 Wallets for Everyday Payments in Japan

Minna Bank (“Minna no Ginko”), Japan’s first digital-native bank and a subsidiary of Fukuoka Financial Group, has announced a landmark initiative to explore how stablecoins and Web3 wallets can transform everyday financial services. In collaboration with Fireblocks, Solana, and TIS, the study will assess the technical and practical applications of stablecoins for real-world payments, trading, and next-generation user experiences.

PCI DSS 4.0 Compliance: A Guide to Requirements 6 & 11

As of March 31, 2025, full enforcement of the PCI DSS 4.0 guidelines is now in effect. This latest version introduces critical updates that strengthen payment card data security across digital environments. Among the most notable changes are requirements that target client-side security, an area that has been largely overlooked until now.

Why your DevSecOps team needs a log management solution

Not all log management and log analysis tools are created equal. With organizations like yours generating large amounts of log data, understanding how to manage, analyze, and secure these log files is key for maintaining system performance, meeting compliance requirements, detecting performance issues, and responding to incidents faster.

What Makes Southeast Asia the "Ground Zero of Cybercrime"?

Author: Bex Bailey Our 2025 Phishing By Industry Benchmarking Report examines why organizations across Asia face some of the highest levels of cybersecurity risk worldwide. In fact, Forrester reveals that organizations in Asia Pacific (APAC) experience an average of 3.5 breaches within a 12-month period versus 2.8 globally. Organizations in the region also experience a cumulative cost of US$2.8 million against the global mean of US$2.7 million.

The MemcycoFM Show: Episode 7 - Evil Twin Attacks Prevention: How to Stop Phishing Before ATO

Many cybersecurity teams are familiar with Evil Twin attacks in theory, but fewer have the tools to detect or stop them during a live session, where the real damage begins. Evil Twin phishing is now a leading entry point for real-time credential theft and account takeover. This episode breaks down how it works, where traditional defenses fail, and what’s required to stop it before attackers succeed.

Migrate from your existing SIEM and quickly onboard security teams with Datadog Cloud SIEM

Many organizations face significant challenges with onboarding teams to a new or existing SIEM. Security teams grapple with escalating expenses tied to data ingestion, storage, and retention at scale. Steep learning curves can make setup an ongoing and frustrating chore, leading to mistakes and gaps in coverage. Further, SIEMs with constrained ecosystem integrations block users from the tools and customizable workflows they need and are comfortable with.

What is a Cloud-Native Security Automation Framework? Benefits & Use Cases

We live in a world where infrastructures reside entirely in the cloud, threats evolve faster than ever, and attackers never sleep. Manual security processes simply can’t keep pace. Cloud-native security automation is the critical solution for organizations to secure large attack surfaces.