Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Threat Hunting with TLS/SSL Certificates

In this article, we’ll analyze how threat actors exploit TLS to hide their operations and how defenders can use exposed certificate metadata to detect them. We will discuss: Let’s get started! (This article is part of our Threat Hunting with Splunk series. We’ve updated it recently to maximize your value.)

When Installers Turn Evil: The Pascal Script Behind Inno Setup Malware Campaign

Software installer packages are a cornerstone of user-friendly software distribution. Tools like Inno Setup, NSIS (Nullsoft Scriptable Install System), and InstallShield help developers bundle their applications into a single, streamlined installer that users can run with just a few clicks. These installers often include everything needed to set up a program, files, configurations, and even system dependencies, making software installation seamless and accessible.

Rise of the Privileged Access Guardian: An Admin's Origin Story

Alex was the kind of IT administrator who kept everything humming smoothly behind the scenes at QuantumAxis Corp. Servers, user accounts, random requests at 4:55 PM on Fridays—he put out the fires and stayed out of the drama. So, when the CISO asked for a “quick chat,” he braced himself. “Alex,” she said, with zero preamble, “we’ve had too many close calls lately.

Scattered Spider Unmasked: How an identity-focused APT is redefining cyber threats

Scattered Spider has emerged as one of the most disruptive advanced persistent threats in recent years, breaching major organizations across telecom, gaming, transportation, and retail. In the last few months, the group has escalated its activity—targeting financial services and launching coordinated ransomware campaigns that have crippled operations and exposed sensitive data.

Minna Bank Taps Fireblocks to Explore Stablecoins and Web3 Wallets for Everyday Payments in Japan

Minna Bank (“Minna no Ginko”), Japan’s first digital-native bank and a subsidiary of Fukuoka Financial Group, has announced a landmark initiative to explore how stablecoins and Web3 wallets can transform everyday financial services. In collaboration with Fireblocks, Solana, and TIS, the study will assess the technical and practical applications of stablecoins for real-world payments, trading, and next-generation user experiences.

PCI DSS 4.0 Compliance: A Guide to Requirements 6 & 11

As of March 31, 2025, full enforcement of the PCI DSS 4.0 guidelines is now in effect. This latest version introduces critical updates that strengthen payment card data security across digital environments. Among the most notable changes are requirements that target client-side security, an area that has been largely overlooked until now.

Why your DevSecOps team needs a log management solution

Not all log management and log analysis tools are created equal. With organizations like yours generating large amounts of log data, understanding how to manage, analyze, and secure these log files is key for maintaining system performance, meeting compliance requirements, detecting performance issues, and responding to incidents faster.

What Makes Southeast Asia the "Ground Zero of Cybercrime"?

Author: Bex Bailey Our 2025 Phishing By Industry Benchmarking Report examines why organizations across Asia face some of the highest levels of cybersecurity risk worldwide. In fact, Forrester reveals that organizations in Asia Pacific (APAC) experience an average of 3.5 breaches within a 12-month period versus 2.8 globally. Organizations in the region also experience a cumulative cost of US$2.8 million against the global mean of US$2.7 million.

The MemcycoFM Show: Episode 7 - Evil Twin Attacks Prevention: How to Stop Phishing Before ATO

Many cybersecurity teams are familiar with Evil Twin attacks in theory, but fewer have the tools to detect or stop them during a live session, where the real damage begins. Evil Twin phishing is now a leading entry point for real-time credential theft and account takeover. This episode breaks down how it works, where traditional defenses fail, and what’s required to stop it before attackers succeed.