Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Mastering API Security Testing: Stop BOLA and the OWASP Top 10 Before Deployment

APIs drive modern applications, but their increasing complexity leaves them vulnerable to attacks. How can you ensure robust API security? Join Wallarm’s webinar to discover how to tackle today’s toughest API security challenges with advanced API security testing strategies. In this webinar we will cover: Learn how Wallarm’s innovative solutions can help you identify vulnerabilities, implement reliable security measures, and streamline your API testing process. Gain actionable insights into tools, best practices, and strategies to protect your APIs effectively.

Bits AI Security Analyst: Automate Cloud SIEM investigations

Datadog's Bits AI Security Analyst transforms the way security teams handle investigations by autonomously triaging Datadog Cloud SIEM signals. Built natively in Datadog, it conducts in-depth investigations of potential threats and delivers clear, actionable recommendations. With context-rich guidance for mitigation, security teams can stay ahead of evolving threats with greater efficiency and precision.

Beyond the Operating System: Ransomware in the CPU

Being alert to ransomware is nothing new. Ransomware can wreak havoc and often cause permanent damage to endpoints, unless effective recovery processes are in place. Many ransomware operators attempt to delete shadow copies and other recovery methods, which makes redundancy in recovery essential. However, the situation becomes even more serious with the emergence of microcode ransomware.

CrowdStrike Falcon Prevents Supply Chain Attack Involving Compromised NPM Packages

Recently, five popular NPM (Node Package Manager) packages were compromised and modified to deliver a malicious DLL, dubbed “Scavenger”. The malware pushed via these compromised NPM packages executes in two stages: an initial first-stage loader, followed by a second-stage infostealer. NPM is the package manager for the Node.js JavaScript platform, which allows developers to share and manage JavaScript libraries and tools.

Contingency Planning: What's the Difference between Incident Response, Disaster Recovery, and Business Continuity?

Contingency planning is the process of determining how to respond to disruptive events. Most organizations are so dependent on IT resources, and most IT resources are so complex, interdependent, and attack prone, that contingency planning is essential to enable organizations to mitigate the likelihood, impact, and duration of disruptions to IT systems.

How CISOs are using AI to automate risk assessments in 2025

In this article In 2025, the role of the Chief Information Security Officer (CISO) and compliance leadership has become even more critical in ensuring that risk assessments are not only comprehensive but also agile and adaptive. Artificial Intelligence (AI) has emerged as a transformative force in cybersecurity, enabling risk assessments to be automated, more accurate, and proactive.