Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Howler Episode 22: The Two Year Anniversary Special!

The Howler Podcast is two years old! In this special episode, Chelsea and Mary are joined by some surprise co-hosts as well as pack members from around the globe as they celebrate Arctic Wolf's one-of-a-kind culture. Interested in running with the pack? Explore careers at Arctic Wolf—one of the fastest-growing and exciting cybersecurity companies in the world, to learn about how you can join our Pack, create impact, and influence what’s next in security operations.

The Great NPM Heist - September 2025

On September 8, 2025, the JavaScript ecosystem experienced what is now considered the largest supply chain attack in npm history. A sophisticated phishing campaign led to the compromise of a trusted maintainer’s account, resulting in the injection of cryptocurrency-stealing malware into 18+ foundational npm packages. These packages collectively accounted for over 2 billion weekly downloads, affecting millions of applications globally—from personal projects to enterprise-grade systems.

Times are Changing. How to Future-Proof Your Cybersecurity Career.

Since the floodgates opened in November 2022 (at the arrival of ChatGPT), there has been one question on everyone’s mind: Is AI going to take my job? While the answers range from yes to no to maybe, there are ways to ride the AI wave without being subsumed by it. The way skilled professionals will do that, especially within cybersecurity, all depends on how well they know the industry—and how well they understand the value of their place in it.

How to Navigate Stablecoin Compliance: KYC, Travel Rule, Transaction Monitoring

Whether you’re building global payout corridors or embedding stablecoin rails into treasury operations, stablecoin compliance is what turns innovation into scale. It’s the reason your banking partners stay comfortable, your regulators stay satisfied, and your operations keep running 24/7, across borders, without fail. The fastest-scaling firms aren’t treating KYC, the Travel Rule, and on-chain transaction monitoring as afterthoughts.

Why CIOs and CISOs Must Be Business Leaders First

In today’s climate, where every company is a technology company, there is a simple truth many still overlook: CIOs and CISOs can no longer afford to see themselves primarily as technologists or risk gatekeepers. The mandate is clear: They must be business leaders first, using technology and cybersecurity expertise as powerful tools to drive growth, trust, and competitive advantage.

Why Is Detecting Insider Threats So Hard-And How Can You Stay Ahead?

Insider threats come from people who already possess legitimate access—employees, contractors, partners. You cannot treat these risks like typical external attacks because insiders operate inside trust boundaries, with valid credentials and normal workflows. When you lack real-time, contextual detection, insider activity progresses quietly. You see isolated events—an odd file download, an unusual login from a different location—without the timeline that shows intent.

Unpacking the Recent npm Supply Chain Attack: What We Know So Far

The software supply chain has once again come under fire, with npm — the world’s largest package ecosystem — at the center of one of the most significant compromises to date. Recent findings suggest that attackers successfully hijacked a maintainer account through phishing, injecting malicious code into popular open-source packages with billions of weekly downloads.

Girona FC Kicks Off Security Partnership with WatchGuard

In an era where professional sports organizations increasingly rely on digital infrastructure, the risks associated with cyber threats are greater than ever. Girona FC, one of LaLiga’s rising professional football clubs, has taken a significant step to enhance its cybersecurity posture by partnering with WatchGuard Technologies. This move reflects the Club’s broader commitment to digital resilience and operational security.

Navigating the ASPM Landscape: Why Veracode was Named a Leader in the IDC MarketScape

The application security landscape is undergoing a profound transformation. Modern development practices, characterized by cloud-native architecture, microservices, and AI-assisted coding, have exponentially expanded the attack surface. In response, organizations are grappling with an overwhelming volume of vulnerabilities from a disconnected array of security tools. This alert fatigue makes it nearly impossible to distinguish real threats from noise.