Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

CrowdStrike Cloud Security Defines the Future of an Evolving Market

Today’s businesses are building their future in the cloud. They rely on cloud infrastructure and services to operate, develop new products and deliver greater value to their customers. The cloud is the catalyst for digital transformation among organizations of all sizes and industries. But while the cloud powers immeasurable speed, growth and innovation, it also presents risk.

Shift left: How securing from code to cloud can improve your time to market

Embracing a shift-left security approach in software development will not only enhance your application security but will also accelerate your software product's time to market. By integrating security practices early in the software development lifecycle (SDLC)—particularly in your cloud-native applications—you can navigate modern cyber threats more effectively as you get to market more swiftly.

Tracking CVE-2024-2876: Why does the latest WordPress exploit compromise over 90,000 websites?

A highly concerning security loophole was recently discovered in a WordPress plugin called "Email Subscribers by Icegram Express," a popular tool utilized by a vast network of over 90,000+ websites. Officially designated as CVE-2024-2876 with a CVSS score of 9.8 (critical), the vulnerability represents a significant threat as it exposes numerous websites to potential attacks.

What CISOs Need to Know About the SEC's New Rules

Working as a Chief Information Security Officer (CISO) has never been easy or glamorous. But with the recent adoption of new rules by the U.S. Security and Exchange Commission on cybersecurity risk management, strategy, governance and incident disclosure, life as a CISO has just gotten harder. Adding to the longstanding organizational risk CISO’s have always managed, now they have to contend with personal risk as well.

Leading the Charge in Intelligence Powered Cybersecurity

In the fast-paced world of cybersecurity, staying ahead of threats is not just a goal—it’s a necessity. We have once again proved this to be true by clinching the prestigious, first-ever Next Gen Intelligence Powered Security award from Cyber Defense Magazine (CDM) at the RSA Conference 2024 in San Francisco. This first-of-its kind award, marks a pioneering step into this new frontier of cybersecurity.

Ensuring Privacy in the Age of AI: Exploring Solutions for Data Security and Anonymity in AI

With the widespread use of AI technology, numerous AI models gather and process vast amounts of data, much of which comprises personal information utilized to offer personalized experiences. However, this abundance of data poses inherent risks, particularly in terms of privacy and security.

Elastic and AWS deliver on AI-driven security analytics

Amazon Bedrock and Elastic’s Attack Discovery automate security analyst workflows As cyber threats grow increasingly sophisticated, the need for highly effective security measures becomes imperative. Traditional SIEMs aren’t equipped to address threats fast enough because they rely on too many manual and labor-intensive tasks. AI-driven security analytics from Elastic’s Search AI platform solves these challenges.

LLMjacking: Stolen Cloud Credentials Used in New AI Attack

The Sysdig Threat Research Team (TRT) recently observed a new attack that leveraged stolen cloud credentials in order to target ten cloud-hosted large language model (LLM) services, known as LLMjacking. The credentials were obtained from a popular target, a system running a vulnerable version of Laravel (CVE-2021-3129). Attacks against LLM-based Artificial Intelligence (AI) systems have been discussed often, but mostly around prompt abuse and altering training data.