Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

NEW in Elastic Security 8.15: Automatic Import, Gemini models, and AI Assistant APIs

Elastic Security 8.15 is now available, enhancing our mission to modernize security operations with AI-driven security analytics. Key features include the brand new Automatic Import to streamline data ingestion and onboarding, support for Google’s Gemini 1.5 Pro and Flash large language models (LLMs), a new set of APIs for the Elastic AI Assistant, on-demand file scans for the Elastic Defend integration, and a redesigned way of pivoting between different contexts.

Mastering the Art of Cloud Governance: A Comprehensive Guide

In today’s fast-paced digital landscape, cloud computing has become an indispensable asset for organizations seeking agility, scalability, and cost-efficiency. However, as businesses embrace the cloud, they must also navigate the intricate challenges of managing and securing their cloud environments. This is where the concept of cloud governance comes into play, serving as a crucial framework for establishing control, ensuring compliance, and optimizing resource utilization.

Over $40 Million Recovered and Arrests Made Within Days After Firm Discovers Business Email Compromise Scam

According to the FBI, billions of dollars have been lost through Business Email Compromise (BEC) attacks in recent years, so you may well think that there is little in the way of good news. However, it has been revealed this week that police managed to recover more than US $40 million snatched in a recent BEC heist just two days after being told about it.

SecurityScorecard and ServiceNow Expand Partnership with New Capabilities for TPRM and Security Incident Response (SIR)

ServiceNow and SecurityScorecard have been longtime strategic partners, helping mutual customers measure and manage cyber risk. Today we’re highlighting the next phase of our partnership and innovation to help customers tackle the complex challenges associated with managing cyber risk in the third party ecosystem. Organizations struggle with prioritization, resource constraints, and the need to act quickly when responding to threats.

Non human Identities - Permissions, Third Party Vulnerabilities and Risk

Non-human identities (NHIs) dominate the era of cloud services and SaaS applications. They are the identities that authenticate between different servers, APIs and third party integrations to provide programmatic access to data and services. Non-human identities utilize different protocols, such as OAuth, REST and SSH.

REPLAY: Revisiting Play Ransomware Anti-Analysis Techniques

The Play ransomware, also known as PlayCrypt, is a ransomware that first emerged in June 2022. The ransomware has been targeting industries such as healthcare and telecommunication as well as a wide range of regions such as Latin America, Europe, and North America. The Play ransomware is known for gaining access to networks through compromised valid accounts or by exploiting specific vulnerabilities. Once inside the network, it uses a big pool of known post-exploitation tools to continue its attack.

Streamline Vendor Risk Management with the New Riscosity and ServiceNow Integration

Today, we’re excited to announce the launch of our integration with the ServiceNow Vendor Response Management (VRM) offering. Riscosity’s integration with ServiceNow empowers security teams with the insights and tools needed to achieve their security goals while still using their existing workflows in ServiceNow VRM.

Evolution of Scalper Bots Part 1: Origins of Scalping

In the evolving landscape of online ticketing and eCommerce, few technological developments have been as controversial as scalper bots. These automated programs, designed to purchase high-demand items faster and more efficiently than humans could, have transformed the way we buy and sell coveted goods online. During this forthcoming blog series, we are going to explore the fascinating evolution of scalper bots. We will trace their origins, developments, and impacts across several distinct eras.