Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Widespread Installation of Calendaromatic Adware Includes Homoglyph Channel

Kroll has recently seen a widespread installation of an application called Calendaromatic, that Kroll Threat Intelligence (TI) is currently classifying as a potentially unwanted program (adware) but displays some functionality that gives it the potential to conduct more malicious behaviors.

Logs & Lattes: Episode 3 - Recognition Without Compromise: Graylog's Rise in the SIEM Market

Graylog earned recognition from both Gartner and GigaOm, and it is reshaping how teams think about SIEM. In this episode of Logs & Lattes, host Palmer Wallace talks with Kimber Spradlin, Chief Marketing Officer at Graylog, about what this dual recognition means for customers, analysts, and the future of security operations.

Recognition Without Compromise: Graylog's Rise in the SIEM Market

Graylog earned recognition from both Gartner and GigaOm, and it is reshaping how teams think about SIEM. In this episode of Logs & Lattes, host Palmer Wallace talks with Kimber Spradlin, Chief Marketing Officer at Graylog, about what this dual recognition means for customers, analysts, and the future of security operations.

API Attack Awareness: Business Logic Abuse - Exploiting the Rules of the Game

As Cybersecurity Awareness Month continues, we wanted to dive even deeper into the attack methods affecting APIs. We’ve already reviewed Broken Object Level Authentication (BOLA), injection attacks, and authentication flaws; this week, we’re exploring business logic abuse (BLA). Unlike technical flaws, business logic flaws exploit how an API is designed to behave.

Report: More Than Half of Adults Encountered a Scam Last Year

Researchers at Bitdefender warn that scams are seeing a steady increase globally. Citing a recent report from the Global Anti-Scam Alliance (GASA), the researchers note that 57% of adults worldwide have reported encountering a scam in the past year, and 13% encounter a scam at least once per day. One in four adults lost money to a scam, and annual global scam losses now exceed $1 trillion.

Password Policy: A History of Getting It Wrong and how to do it right in 2025 | October Cyber Bytes

In this session, Sedara’s David Frier explores the fascinating history of password policies—how the industry went wrong in the early 2000s, and what we’re finally getting right in 2025. From outdated complexity rules to modern authentication standards, this webinar breaks down decades of password practices and reveals how organizations can strengthen security while making life easier for users.

How AI Cuts SIEM Migration Time from Months to Minutes

SIEM migration is tedious, time-consuming, and pulls security professionals away from actual security work. Manually exporting thousands of detection rules, translating query logic, and fixing errors can take weeks or months. In this episode of AI can do what now?!, Haran Kumar (principal security solutions architect at Elastic) walks through how AI actually helps automate SIEM migration.