Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

DeepSeek: A Deep-Dive into the Latest AI-powered LLM

DeepSeek is a Hangzhou-based startup founded in December 2023 by Liang Wenfeng. It released its first AI-based large language model in 2024. The company recently received widespread attention after releasing a new open-source AI model that rivals OpenAI’s work. The app shot to the top of the app stores’ downloads list and has sparked much interest.

Top 5 Strategies to Reduce Dwell Time with XDR: Accelerating Threat Detection and Response

Cyber adversaries operate with one goal in mind—stealth. The longer they go undetected in an environment, the more damage they can cause. Dwell time is the total amount of time that a threat remains unnoticed in a system, from initial compromise to discovery. According to the most recent threat reports, the average dwell time for undetected breaches has reduced but remains at 10-15 days, providing attackers enough time to exfiltrate data, launch ransomware, or establish persistent access.

The Secret to Your Artifactory: Inside The Attacker Kill-Chain

Artifactory token leaks are not the most common, but they pose significant risks, exposing sensitive assets and enabling supply chain attacks. This article explores the dangers of leaked tokens and proposes mitigation strategies, including token scoping and implementing least privilege policies.

Behind the scenes of Elastic Security's generative AI features

A quantitative approach to prompt tuning and LLM evaluation Elastic has long been developing machine learning (ML) and AI-powered security detections. We constantly bring in new technologies when available to help make our users’ lives easier. So, with the rise of generative AI (GenAI), we have developed even more Elastic Security features to use this powerful, new technology. Among those are.

How To Secure Your Supply Chain Against Vulnerability Of Cyber Threats

The average modern business is currently facing a cybersecurity threat. When hackers strike, they target core aspects of the organization, especially the supply chain. Some of the deadliest supply chain cyber attacks have resulted in major losses, halting global business operations. These threats will only increase without any major pushback. That said, the best way to save your business is to plan proactive and reactive measures to combat these threats.

Can You Remove Court Records from the Internet? Here's How It Works

Your legal past shouldn't be an open book. But thanks to the internet, court records, lawsuits, and personal legal history are often just a Google search away. That's a serious problem for security and privacy. Criminals, stalkers, and scammers can use court records to track down personal information. Even if a case was minor-or dismissed-it can still show up online and cause real harm. Here's why old court records pose a security risk, how they get online, and what you can do to remove them.

Why securing cloud-native applications goes beyond AppSec?

In today’s landscape of microservices, Kubernetes, and cloud environments, attacks can come from multiple vectors, with varying degrees of complexity. Understanding these vectors and how to detect them is crucial for securing your infrastructure and applications. This post will explore various attack scenarios including SQL Injection and Cluster Takeover, structured around the 4 Cs of cloud security: Cloud, Cluster (Kubernetes), Container (workload), and Code (application).

CIS Benchmarks Checklist: Is Your Windows Server 2025 Secure? A Guide for Immediate Protection

Windows Server 2025, the latest iteration of Microsoft's flagship server operating system, introducing new features, enhanced performance, and improved security capabilities. However, with these updates come new potential vulnerabilities, bringing with it the need for robust security configurations to protect against evolving threats. This is where benchmarks and hardening practices come into play.

Toxins in the Community: Recent Social Media Poisoning Campaigns in the Philippines

A lot has happened since the emergence of social networking began in the early 2000s. Since then, many people have relied on social media platforms to stay connected with friends, family, community, and more. With this popularity, cyber criminals also took advantage of this trend.

Mastering PowerShell Regex: Syntax, Examples and Best Practices

A regular expression (regex) is a sequence of characters that defines a pattern or template, such as the format of email addresses or Social Security numbers. Regular expressions are useful for pattern matching and text manipulation. For example, regex can help you quickly find all failed login attempts in a server log so you don’t have to manually read through thousands of lines.