Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SBOM 2.0: Runtime Visibility, License Intelligence, Unmatched Container Security.

We’re excited to announce a major enhancement to the ARMO platform: Full Software Bill of Materials (SBOM) with Runtime Visibility and Open Source License Insights. In today’s threat landscape, it’s not enough to know what went into your containerized applications. You need to know what’s actually running, how it’s behaving, and whether it introduces compliance or legal risks. ARMO’s new SBOM capability delivers just that.

A practitioner's guide to classifying every asset in your attack surface

“You can’t secure what you don’t know exists.” It’s a common refrain in cybersecurity (and for good reason!). But the reality is a bit more complex: it’s not enough to just know that something exists. To effectively secure your assets, you need to understand what each of them is. Without proper classification, applying the right security processes or tools becomes a guessing game.

Actions to Take Following the M&S Cyber Attack

In light of the recent disclosure by Marks & Spencer (M&S) regarding a cyber attack that resulted in the theft of customer data, we strongly recommend that if you are affected you take immediate and proactive steps to protect your digital identity and reduce the risk of further compromise.

CVE-2025-32756: Exploitation of Critical Severity Zero-Day Vulnerability in Fortinet FortiVoice

On May 13, 2025, Fortinet published a security advisory on a critical severity stack-based overflow vulnerability, CVE-2025-32756, impacting FortiVoice, FortiCamera, FortiMail, FortiNDR, and FortiRecorder. The vulnerability allows remote unauthenticated threat actors to execute arbitrary code or commands via crafted HTTP requests. In the advisory Fortinet stated that the vulnerability has been exploited in the wild on FortiVoice.

One Click Is All It Takes: The Danger of CSRF Attacks

CSRF attack or Cross-site request forgery is a very dangerous and stealthy web security vulnerability that exploits trust from a user's browser for a web application. A successful CSRF attack deceives an authenticated user into performing some operations without his consent-like account modification or payment or financial transaction against his will. Most alarming in such cases is that CSRF attacks usually remain unknown for end-users that make defending against them difficult.

Internal Cybersecurity Risks in Organizations

When most people think of cybersecurity threats, they picture outside attackers trying to breach the network. But often, the biggest risks are already inside. Whether it’s human error, shadow IT, or poor policy enforcement, internal vulnerabilities can be just as damaging. In this blog, we’ll explore five commonly overlooked cybersecurity risks within organizations and how you can proactively address them.

SOAR & DSDL: Crossover for Agentic AI Workflow

Recently we released the Splunk App for Data Science and Deep Learning (DSDL) v5.2.0. This update introduced new features for integrating large language models (LLMs) and retrieval-augmented generation (RAG). With DSDL v5.2.0, users can easily perform LLM prompts, vector searches, RAG, and function calling directly from the app's dashboards.

The Benefits of Shifting Left: Minimize Risk and Save Money with Early Security Integration

Shifting left in security, or integrating security early in the software development lifecycle (SDLC), can help your organization save time and money. By identifying and addressing potential security flaws early, organizations can reduce the likelihood of vulnerabilities being exploited in production applications. This proactive approach is more cost-effective and time-efficient, as it prevents the accumulation of technical debt and minimizes the need for extensive rework or redesign.

What Is Jenkins? Features, Benefits & Core Concepts

Jenkins is an open-source automation server that is widely used for continuous integration (CI) and continuous delivery (CD) in software development. It is an automated engine that builds, tests, and deploys the application so that development teams can routinely integrate code changes in a way that ensures the software is deployable. Created as the Hudson project in 2004, Jenkins has grown to become an infinitely extensible and customizable tool hosting an enormous ecosystem of plugins.

Identity Is the New Root Access: Rethinking Zero Trust in DevOps Environments

Amal Mammadov is a cloud security and detection engineering specialist working at the frontlines of identity-driven threats in modern cloud environments. His work focuses on how attackers exploit permissions, tokens, and machine identities, often without triggering traditional security controls. In this conversation, he breaks down why Zero Trust is no longer about networks but about controlling identity in fast-moving DevOps systems.