Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Did you make the *security* naughty or nice list this year?

As we approach the end of the year, many of us are reflecting on what we accomplished in 2024 — what did we do well this year? What could we have done better? It's also the perfect time to reflect on how to improve your team’s security practices. Have you been staying ahead of threats or have you let a few vulnerabilities slip through the cracks?

CVE-2024-6197 Curl and Libcurl: Use-after-Free on the Stack

On July 24th 2024, Curl maintainers announced a new stack buffer Use After Free (UAF) vulnerability – CVE-2024-6197. This type of vulnerability is very uncommon since UAF issues usually occur on the heap and not on the stack. While the vulnerability can be easily exploited for causing denial of service, in this blog we will show why we believe that it is almost impossible to exploit this vulnerability to achieve remote code execution in any real-world setup.

How to Prevent Hacking During the Holiday Season

The holidays are a busy time for cyber attackers. They rely on distracted workers and lax security systems to breach an organization’s defenses. Then, they deploy ransomware or perform smash-and-grab operations on as much information as they can get their hands on. Either way, the goal is the same: profiting from a brief moment of weakness in your cybersecurity defenses. If you’re wondering how to prevent hacking during this hectic time of year, Lookout is here to help.

4 tips for securing GenAI-assisted development

Gartner predicts that generative AI (GenAI) will become a critical workforce partner for 90% of companies by next year. In application development specifically, we see developers turning to code assistants like Github Copilot and Google Gemini Code Assist to help them build software at an unprecedented speed. But while GenAI can power new levels of productivity and speed, it also introduces new threats and challenges for application security teams.

Don't Choose Between DSPM and DLP: Here's Why You Need Both

As security leaders, you’re tasked with protecting the crown jewels of our organizations, your data, while balancing innovation, compliance, and ever-evolving threats. Yet, too often, data security strategies rely on isolated tools and reactive measures, leaving critical gaps.

Tines 2024: a year in review

2024 was a special year for Tines. And a busy one! We introduced 177 (and counting) new product capabilities. We raised an additional $50M from existing investors. And most importantly, our builders – the users of the Tines platform – brought more workflows to life than ever before: solving problems for their teams, and often sharing their learnings with the broader Tines community.

Change control in Tines: safeguarding your most important workflows

As company priorities and processes evolve, testing and implementing changes in your workflows is essential, especially for those workflows with a major influence across your business. Should the team push the wrong change live, an alert’s remediation process could be potentially slowed down, or employee information could be revealed to the wrong team.

CrowdStrike Earns AAA Award, 100% Total Accuracy Score in SE Labs Q3 Enterprise Advanced Security Test

The CrowdStrike Falcon platform started 2024 being recognized as SE Labs’ Best Endpoint Detection and Response 2024 award for the third consecutive year. Adversaries never stop and neither do we — CrowdStrike Falcon is the only platform that provides a unified view of stealthy threats across multiple domains exploited in attack paths.

Zero Standing Privileges: Minimizing Attack Surfaces in Organizations

Restricting access to critical data and systems is the backbone of strong organizational cybersecurity. Zero standing privileges (ZSP) is an access management strategy that helps organizations limit access to resources as much as possible in order to minimize cybersecurity risks. In this article, we’ll explore the elements of a ZSP strategy, explain the risks related to standing privileges, and examine how to implement ZSP in your organization.