Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Is your VPN a silent entry point for attackers?

Is your VPN a silent entry point for attackers? Credential stuffing and password spraying exploit weak authentication, giving attackers a way into VPNs and edge network devices — making them prime targets in today’s identity-driven threat landscape. In this snippet, our expert breaks down: Watch the full webinar: Adapting to a New Paradigm in Security – Implementing ITDR in Your SOC: netwrix.com/go/adapting-to-a-new-paradigm-in-security-yt.

Interview: Predictive vs. Reactive with Robert Boles, Founder / CEO of BLOKWORX [248]

On this episode of the Cybersecurity Defenders Podcast we speak with Robert Boles, Founder / CEO of BLOKWORX. A veteran of the U.S. Marine Corps, Rob founded BLOKWORX in 2006 to further his passion for creating fast, secure networks. Since 1999 Rob was a core technical contributor and presenter on an Advanced IP Team, delivering bleeding edge WAN and Managed Security services to Small, Mid-level and Fortune 500 businesses around the world.

The MemcycoFM Show: Ep 15 - How CISOs Apply Zero Trust Thinking to Credential Harvesting Prevention

A customer opens their bank’s login page. At least, that’s what they think. The design is flawless, the fields are familiar. But it’s a cloned site built to harvest credentials. Within seconds, their details are replayed against the genuine portal. To the bank’s defenses, it looks like business as usual — same username, same password, same MFA prompt.

Beware the Sandworm: The Shai-Hulud Attack Explained

A new and dangerous self-replicating worm has been identified targeting the JavaScript repository NPM, infecting at least 187 code packages. The novel malware strain is engineered to steal credentials from developers and publish them to a new public GitHub repository. The worm automatically propagates itself by copying its code into the top 20 most popular packages maintained by the compromised user and publishing them as new versions.

Proving DORA Requirements with the SafeBreach Platform

Complying with the Digital Operational Resilience Act (DORA) means proving that resilience is built into daily operations through ongoing, evidence-backed practices. SafeBreach, the leader in enterprise exposure validation, helps institutions meet DORA’s key requirements by simulating real-world threats across the MITRE ATT&CK framework.

Laying the groundwork: Building security foundations at the partial stage

Every mature security program starts somewhere. For many organizations—especially startups and early-stage companies—this is what the NIST Cybersecurity Framework (CSF) calls the partial stage. ‍ At this level, security is often reactive. Teams operate with minimal resources and ad-hoc processes, working hard to meet customer or compliance demands but without the structure or long-term strategy needed to scale.

Detect Secrets in GitLab CI Logs using ggshield and Bring Your Own Source

Discover how to automatically detect secrets in GitLab CI logs using ggshield and GitGuardian's Bring Your Own Source initiative. Learn to set up real-time scanning to prevent credential leaks, enhance compliance, and secure your entire CI/CD pipeline from hidden risks.