Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

API Honeypot Results: How Fast Do Hackers Strike? #CyberThreats #InstantDefense #HackerSpeed

New APIs are attacked in just 29 seconds, according to Wallarm’s API honeypot test. Batch requests can extract 10M records in under 10 seconds, making real-time protection essential. Learn how to secure APIs before attackers strike.

Anomaly Detection in IoT Networks: Securing the Unseen Perimeter

The explosion of Internet of Things (IoT) devices has transformed our world in countless ways, from smart factories to connected healthcare systems. According to recent projections by IoT Analytics, the number of connected IoT devices is expected to reach 40 billion by 2030 . This exponential growth has created an expansive and often invisible attack surface that traditional security measures struggle to protect.

APIs: The Silent Highway for Sensitive Data

Think about how your banking app connects to payment processors or how your healthcare provider’s system shares records securely – APIs have become essential for modern digital interactions, enabling applications to communicate and share data effortlessly. However, this convenience comes at a cost: APIs often handle vast amounts of Personally Identifiable Information (PII), making them prime targets for API data exfiltration.

Enhanced security and simplified controls with automated botnet protection, cipher suite selection, and URL Scanner updates

At Cloudflare, we are constantly innovating and launching new features and capabilities across our product portfolio. Today, we're releasing a number of new features aimed at improving the security tools available to our customers. Automated security level: Cloudflare’s Security Level setting has been improved and no longer requires manual configuration.

Password reuse is rampant: nearly half of observed user logins are compromised

Accessing private content online, whether it's checking email or streaming your favorite show, almost always starts with a “login” step. Beneath this everyday task lies a widespread human mistake we still have not resolved: password reuse. Many users recycle passwords across multiple services, creating a ripple effect of risk when their credentials are leaked.

Falcon Cloud Security Identifies AI-Driven Packages in Container Images

Artificial intelligence (AI) is rapidly transforming industries, but with this innovation come new security challenges as threat actors explore AI’s powerful capabilities. They’re adopting new techniques, targeting AI models, injecting malicious code into AI processes, and exploiting vulnerabilities in AI-related software packages.

Why Optimizing Websites for Mobile Devices Is Important and How to Do It Effectively

We live in a world where mobile devices are inextricably linked to our daily lives. Be that for work or personal use, we access the internet, buy things, manage finances, and more. It is convenient, quick, and easy: you pull out your phone, Google whatever you need, click a few buttons, and everything is done. And if you are a business owner who works online too, having a mobile-friendly website is a must if you aim for success. Many users find it irritating when a website is poorly responsive or is difficult to use. So, when you launch your website, a few things should be considered if you do not want to lose customers.

The Purdue Enterprise Reference Architecture: Strengthening IoT and OT Security in Industrial Environments

In an era where Industrial Internet of Things (IIoT) and Operational Technology (OT) are converging, securing industrial environments has never been more critical. The Purdue Enterprise Reference Architecture (PERA), a model that has been a foundation for network segmentation and security for over three decades, remains a pivotal framework for safeguarding industrial systems in this complex digital age.

Security Week teaser and Lisbon's waves of entropy

We’re back with new episodes in 2025, kicking off this week with a Security Week teaser. Host João Tomé is joined by Michael Tremante, Sr. Director of Product Management, to discuss what to expect from our first innovation week of the year, starting next week. They also explore the security landscape in 2025 and the importance of simplicity.