Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

SharePoint "ToolShell" zero day

Hats off to the great work the community and industry has done regarding the “ToolShell” attack against Microsoft’s On-Premise SharePoint servers. The goal of this article is to build on that great work and help Sumo Logic customers with on-prem SharePoint servers investigate and identify evidence within their environments.

ISO 27001 for healthcare companies: Benefits and implementation steps

ISO 27001 is a widely used standard for protecting the security of organizations across sectors and their data through comprehensive controls. While it’s beneficial for virtually any industry, organizations in the healthcare sector often find it especially valuable. ‍ This is because they’re often subject to extensive but vaguely defined regulations, and ISO 27001 provides the structured approach to compliance they need.

Backup Guide For Jira Automation Rules

It’s no news that Jira Automation Rules (JAR) sit at the center of how teams choose to streamline work. They triage requests and escalate incidents. At the same time, they keep systems running smoothly without requiring human intervention. For teams managing ITSM, DevOps, and cross-functional service operations, these rules are operational logic with many conveniences.

What You Need to Know about the Radiology Associates of Richmond Data Breach

Founded by Dr. Daniel Talley in 1905, the Radiology Associates of Richmond is one of America's oldest private radiology practices. RAR has since been at the forefront of advanced diagnostic, interventional services, and medical imaging. The institution spans seven hospitals and four outpatient centers in central Virginia. RAR has 62 board-certified radiologists, and the practice specializes in breast imaging, neuroradiology, and vascular interventions.

What is Data Poisoning? Types, Impact, & Best Practices

Data poisoning is a type of cyberattack where malicious actors deliberately manipulate or corrupt datasets meant for training machine learning models, especially large language models (LLMs). Tampering parts of a raw data set with an incorrect, often duplicitous one can negatively impact the result in various ways. Fundamentally, it aims to alter how AI models learn information so that the output is flawed.

Malware vs Spyware: Types, Risks, and Differences

Let’s talk about Malware vs spyware. They might sound similar, but they pose different kinds of threats, and both can seriously compromise your privacy and security. Both have a long history of causing chaos for businesses and individuals, but with the right knowledge, knowing how to spot malware vs spyware will increase your chances of preventing these kinds of cyberattacks before they ruin your device or compromise your data.

Microsoft Kills the Blue Screen of Death After 40 Years: Meet the New Black Screen of Death

Microsoft just made history. But not the kind you’re used to. For nearly four decades, the Blue Screen of Death (BSOD) haunted Windows users. One minute you’re sipping coffee. Next, your screen goes blue with a sad emoji and cryptic codes. However, Microsoft has now officially pulled the plug on this iconic crash screen.

Riscosity Launches The DFPM Trust Center

For a AI software company like Riscosity, which helps organizations secure and govern data flows to third parties, compliance is not just a regulatory requirement—it is central to the value proposition. Recognizing this, Riscosity has launched a dedicated Trust Center at trust.riscosity.com, powered by industry leader Vanta, to streamline how it communicates its compliance posture with current and prospective customers.

Torq + SSDLC: Where Secure Automation Begins

Legacy SOAR solutions emerged in an era of traditional, static on-premises networks with fewer sophisticated threats. But today’s cybersecurity landscape is dramatically different — attack surfaces rapidly evolve, threats are multifaceted, and cybersecurity talent is increasingly scarce. As organizations struggle with sprawling security stacks and burned-out SOC teams, legacy SOAR solutions reveal their significant limitations.