Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Contain the SSO blast radius: Identity security beyond MFA

Over the past week, multiple research teams have documented a renewed wave of voice-led social engineering (vishing) targeting identity providers and federated access. The entry point is not through malware or a zero-day exploit. The goal is simple. Persuade a user to help complete authentication in real time, then use that trusted session to move through SaaS applications and exfiltrate data. Security leaders already know the fundamentals. Multi-factor authentication (MFA) can be socially engineered.

AWS ECR Scanning: The Practical Guide to Securing Your Containers

If you operate containers on AWS you’re likely familiar with how vulnerabilities can accumulate. The majority of container images currently include least one critical security flaw. Frequently hidden within a base image or an overlooked dependency. This makes enhancing your AWS container security essential. It’s the method to prevent problems such, as data leaks, privilege abuse and supply-chain threats.

Defending against deepfake cyberattacks: Why trust is the new security perimeter

Deepfake technology is now a legitimate enterprise level threat. What started as a potentially disturbing AI capability has rapidly become a powerful tool for cybercriminals and one that exploits the most fundamental element of business communication: trust. A new report from Info‑Tech Research Group, Defend Against Deepfake Cyberattacks, breaks down how to understand and assess the risk deepfakes pose to organizations of all sizes.

Report: One in Ten UK Companies Wouldn't Survive a Major Cyberattack

A new survey by Vodafone Business found that more than 10% of companies in the UK would likely go out of business if they were hit by a major cyber incident, such as a ransomware attack, Infosecurity Magazine reports. Additionally, 71% of business leaders believe at least one of their employees would fall for a convincing phishing attack, and fewer than half (45%) of organizations have ensured that all of their employees have received basic cyber awareness training.

What Security Teams Need to Know About OpenClaw, the AI Super Agent

OpenClaw, an open-source AI agent previously known as Clawdbot and Moltbot, is a powerful personal assistant that can connect to LLMs, integrate with external APIs, and autonomously execute an array of tasks like sending email or controlling browsers. While OpenClaw carries the promise of AI-driven productivity, it also presents growing security concerns. OpenClaw is installed on local machines or dedicated servers.

Hunt an IP address across multiple tenants simultaneously with Claude Code #cybersecurity #ai

See Claude Code execute a parallel IOC hunt for a suspicious IP across multiple LimaCharlie organizations. The agent enumerates all available tenants, launches concurrent searches, normalizes results into match categories, and reports positive hits with sensor details, timestamps, and occurrence counts. Security teams can investigate threats across their entire fleet without manually querying each tenant.

Breaking AppSec Myths - Obfuscated Packages

As part of the JFrog Security Research team’s ongoing work, we continuously monitor newly published packages across multiple ecosystems for malicious activity. This effort serves the broader open source community through public research disclosures, and it directly impacts the detection capabilities behind JFrog Xray and JFrog Curation. Our scanning pipeline uses a broad set of indicators to detect suspicious behavior.

Forensic Search & App Intelligence Add Up to Complete Insider Risk Visibility

Traditional data loss prevention stops at detection. You get an alert. You know something happened. But you don't see the full picture. When a departing engineer downloads your entire codebase over the holiday break, you need more than a policy violation. You need to see what they were doing before that moment, where the data came from, and what happened after. You need context, timeline, and the ability to trace every action.