Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Corelight Recognized as a Leader in the 2025 Gartner Magic Quadrant for Network Detection and Response

Network Detection and Response (NDR) has emerged as a must-have capability of modern security operations (SecOps). NDR provides deep visibility, detection of advanced threats that evade other security tools, and rapid response capabilities to address the SecOps challenges of incomplete visibility, detection gaps, high SIEM and storage costs, and tool sprawl that impact accuracy, speed, and efficiency.

The Multi-Agent System: A New Era for SecOps

Security teams face mounting pressure to defend against sophisticated cyber threats. Traditional automation strategies are often rigid, reactive, and lack the ability to scale effectively. Many SOCs already have access to generative AI to assist with simple tasks and now Torq has brought agentic AI into the mix — which thinks, acts, and learns autonomously to handle security risks. What’s next?

How ASPM Analytics Empower CISOs with Real-Time Security Insights

Understanding the security posture of your application stack is increasingly important. Exploitation of vulnerabilities surpassed phishing as the known initial access vectors in non-Error, non-Misuse breaches, according to the Verizon 2025 Data Breach Investigations Report. As a CISO or security leader, are you prepared for this shift in the industry?

Ep 9: The New Frontline

Colonial Pipeline was a warning shot. Now, Chinese hackers are inside the digital guts of hundreds of Colonial equivalents across the U.S.—power, water, transportation, and more. The question isn’t if they’re in. It’s why. And what happens next. Is this digital coercion? A warning to stay out of Taiwan? Is an invasion imminent—and are we ready for the cyber fallout that could come with it?

Why You Report Critical Bugs Immediately #cybersecurity #appsec

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Scammers Exploit Uncertainty Surrounding US Tariffs

Cybersecurity experts are warning that scammers are taking advantage of uncertainty surrounding the U.S. administration’s tariff policies, CNBC reports. Fraudsters may send texts or emails posing as retailers, delivery companies or government agencies, requesting tariff-related payments for purchases and deliveries. James Lee, president of the Identity Theft Resource Center, noted that scammers frequently take advantage of new government policies to launch phishing attacks.

Capital One Customers Targeted By Credential Harvesting Phishing Campaign

The KnowBe4 Threat Lab has identified an active phishing campaign impersonating Capital One. The attacks are sent from compromised email accounts to help them evade reputation-based detection by native security and secure email gateways (SEGs). Once delivered, the attacks use stylized HTML templates and brand impersonation to trick the recipient into believing the communications are legitimate. Recipients who fall victim are directed to credential-harvesting websites.

Understanding the Risks of Remote Monitoring and Management Tools

The IT environment is evolving. Organizations have embraced hybrid work models, expanded their operations and personnel footprints, and digitalized their processes and capabilities. And those in charge of these now sprawling environments must deal with the increasingly complicated task of keeping endpoints, users, and more both operational and secure.

How NIS2 Is Forcing Companies to Rethink Their Security Architecture

The NIS2 Directive is raising the bar for cybersecurity compliance across the EU, pushing companies to reevaluate and strengthen their entire security architecture. With stricter requirements, broader sector coverage, and hefty penalties for non-compliance, many organizations are feeling unprepared for the level of transparency and resilience now expected. This shift is creating urgent challenges-especially for businesses with fragmented systems, limited incident response plans, or outdated infrastructure.