Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Automated provisioning and governance for healthcare company, B Braun

Join B Braun representatives Andreas Müller, IT project manager, and Michal Kasynski, identity manager engineer as they explore their choice of One Identity Manager for their healthcare and pharmaceutical company’s identity governance and administration (IGA) needs.

Ep 14: Security IS observability: Prove us wrong

In this episode, we discuss the critical intersection of security and observability within organizations. We highlight the often contentious relationship between security analysts and SREs, emphasizing the importance of fostering a collaborative culture to effectively address incidents. All teams should focus on solutions rather than blame, as user experience is affected by both security and infrastructure issues. We explore how to break down silos, especially in the context of AI security, and encourage cross-disciplinary learning to enhance overall security practices.

PhishinGit - GitHub.io pages abused for malware distribution

This blog discusses PhishinGit, a phishing campaign uncovered by CYJAX that abuses GitHub.io pages to distribute malware disguised as Adobe downloads. It explains how threat actors used Browser-in-the-Browser (BitB) techniques, Dropbox-hosted payloads, and anti-analysis JavaScript to evade detection. The blog also explores the attack chain, observed mitigations, MITRE ATT&CK mapping, and indicators of compromise (IOCs) to help organisations identify and defend against similar threats.

PCI DSS Compliance for E-Commerce: How to Secure and Monitor Payment Pages

Modern checkout pages have evolved from static forms into dynamic ecosystems where dozens of third-party scripts run alongside first-party code. This complexity expands the attack surface and challenges traditional defenses designed for fixed perimeters. PCI DSS 6.4.3 was introduced to address that shift, emphasizing continuous oversight of browser-executed scripts and the integrity of client-side behavior.

CJIS Security Policy compliance: An extensive guide

The Criminal Justice Information Services Division (CJIS) within the FBI manages Criminal Justice Information (CJI). Considering the highly sensitive nature of law enforcement data, you have to implement federal security standards to safeguard CJI against increasingly complex cybersecurity threats. ‍ The CJIS Security Policy was introduced in 1992 as a framework to protect CJI through both strategic and tactical measures.

How to demonstrate your AI security posture: A step-by-step guide

As organizations integrate AI into their everyday systems and operations, the scrutiny on the risks it introduces is higher than ever. According to Vanta’s State of Trust Report 2024, more than half of organizations express concerns over security risks compounded by AI. ‍ The growing unease highlights a new business expectation: you must be able to prove your organization is using AI securely and responsibly.

The F5 BIG-IP Source Code Breach

On August 9, F5 discovered that multiple systems were compromised by what it is calling a "highly sophisticated nation-state threat actor" who maintained "long-term, persistent access to certain F5 systems". These included the BIG-IP product development environment and engineering knowledge management platform. That access allowed for the exfiltration of portions of F5's BIG-IP source code as well as information about undisclosed BIG-IP vulnerabilities F5 was working on.

Reflections from the AI Agent Security Summit in San Francisco

Last week, I had the honor of emceeing the AI Agent Security Summit in San Francisco, a gathering of some of the brightest minds exploring the intersection of artificial intelligence, security, and human responsibility. Having moderated a panel at the first Summit in New York City earlier this year, stepping into the emcee role this time around was a different experience, but just as enjoyable. On-demand recordings of the sessions will be available soon.

How Falcon Exposure Management's ExPRT.AI Predicts What Attackers Will Exploit

Nearly 40,000 vulnerabilities were disclosed in 2024.1 Security teams are overwhelmed, especially those relying on outdated tools. ExPRT.AI, the native intelligence engine embedded in CrowdStrike Falcon Exposure Management, is built to help teams prioritize which vulnerabilities are most urgent for them.