Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

January 2025

Major Supply Chain Cybersecurity Concerns and 7 Best Practices to Address Them

In today’s interconnected world, supply chains are essential for nearly every product and service. Yet, this interconnectedness comes with vulnerabilities. In fact, 41% of organizations that suffered material impacts from a cyberattack in 2023 report that those cyberattacks originated from a third party, according to the 2024 Global Cybersecurity Outlook by the World Economic Forum. What supply chain security issues might your organization face?

DORA Compliance: Checklist for 2025

Financial organizations across Europe are actively preparing for the Digital Operational Resilience Act (DORA), taking effect in January 2025. Meeting DORA compliance requirements has become essential for financial institutions as they adjust their operations to match new regulatory standards. The legislation brings substantial changes to information and communication technology (ICT) risk management practices, security protocols, and third-party oversight.

Integrate Bitbucket Cloud With GitGuardian's Secrets Detection Platform Now Supports

We are proud to announce that BitBucket Cloud users can now leverage the GitGuardian Secrets Detection platform to find hardcoded secrets throughout their existing codebases and actively monitor any code changes for newly leaked credentials. We have supported Bitbucket Data Center and Sever for years, but now, teams managing code on bitbucket.org can reap those same benefits. Integration is very simple and straightforward.

Integrate Jira Data Center With GitGuardian For Real-Time Secrets Detection

We are excited to announce that Jira Data Center users can now leverage GitGuardian to perform real-time scanning for secrets in issues and comments. We have supported Jira Cloud with real-time scanning for some time, but now teams that run their own private versions of the popular project management tool, helping teams plan, track, and release work. You can install GitGuardian on multiple Jira Data Center sites to monitor your projects.

Operation 99: North Korea's Cyber Assault on Software Developers

On January 9, the SecurityScorecard STRIKE team uncovered Operation 99, a cyberattack by the Lazarus Group, North Korea’s state-sponsored hacking unit. This campaign targets software developers looking for freelance Web3 and cryptocurrency work. If you thought fake job offers from the group’s Operation Dream Job campaign were bad, this latest move is a masterclass in deception, sophistication, and malicious intent. Here’s why Operation 99 demands your attention.

CrowdStrike Insider Risk Services Defend Against the Threats Within

Insider threats are among the most elusive and damaging forms of cybersecurity risk. According to the Ponemon Institute, 71% of organizations experienced between 21 and 41 insider incidents in 2023, up 67% over the previous year. The average annual cost of insider threats also climbed to $16.2 million per organization, the report found.

CrowdStrike Falcon for Legacy Systems: Modern Security for Legacy Environments

Many organizations across critical industries such as healthcare, manufacturing and energy rely on legacy Windows operating systems to run essential equipment. These systems, while operationally vital, are notoriously difficult and costly to upgrade — leaving them vulnerable to modern cyber threats. CrowdStrike is addressing this challenge by expanding our legacy support with the general availability of CrowdStrike Falcon for Legacy Systems.

SOAR into 2025: SOAR's evolving role in security and beyond

Security Orchestration, Automation, and Response (SOAR) is rapidly evolving to meet the demands of modern security teams. As organizations face increasing threats and complexity, choosing the right SOAR solution has never been more critical. Join Matt Muller, Field CISO at Tines, and Andrew Green, Networking & Security Research Analyst at GigaOm, for an in-depth discussion on the state of the SOAR market and what’s next for security automation.

CVE-2024-55591: Follow up: Authentication Bypass Vulnerability in Fortinet FortiOS and FortiProxy

On January 14, 2025, Fortinet published a security advisory for CVE-2024-55591, an authentication bypass using an alternate path or channel vulnerability in FortiOS and FortiProxy. A remote threat actor can craft requests to the Node.js websocket module to gain super-admin privileges.