Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The Evolving Importance of Attack Surface Management

As enterprises continue to adopt hybrid and multi-cloud environments, the complexity of managing network security has increased significantly. Attack Surface Management (ASM) has emerged as a critical capability for identifying, monitoring, and mitigating risks across these dynamic environments. Forward Networks’ innovative digital twin technology delivers a compelling solution that addresses the challenges of effective ASM practices.

DeepSeek-V3: The AI Beast with 671 Billion Parameters - Game Changer or Privacy Nightmare?

Executive Summary DeepSeek is one of the biggest AI-based systems that originated in China, some serious cyberattacks recently disrupted its services, especially affecting new user registrations. It is not yet clear how it has been done. However, based on analysis and experience, people believe it was a Distributed Denial of Service (DDoS) attack against the system, as a DDoS attack simply sends too much traffic to any given system that causes downtime.

How Mirai Security makes enterprise-level security accessible with Vanta

‍Founded in 2017 and headquartered in Seattle, WA, Mirai Security is a leading cybersecurity consultancy dedicated to delivering scalable, cost-effective solutions to businesses at every stage of their security journey. As a leading Managed Security Service Provider (MSSP), Mirai Security specializes in building and managing governance, risk, and compliance (GRC) operations, delivering tailored, end-to-end security programs to meet diverse client needs.

Choosing the Right CNAPP: Essential Tips for Effective Decision-Making

A Cloud-Native Application Protection Platform (CNAPP) is an integrated cloud security solution designed to safeguard cloud-native applications throughout their lifecycle. It combines various cloud native security tools and practices such as Cloud Workload Protection Platform (CWPP), cloud security posture management (CSPM), and Cloud Container Security to provide comprehensive protection across development, deployment, and operational phases in cloud environments.

How SMB Misconfigurations Can Lead to Full Network Takeover: A Red Team Case Study

Server Message Block (SMB) is a ubiquitous protocol used for file sharing, remote access, and resource management across enterprise networks. While critical for business operations, its misconfigurations can expose vulnerabilities to attackers. In this blog post, we’ll dive into a real-world red team operation where a simple yet effective PowerShell-based tool led us from SMB enumeration to full network takeover.

Analyzing DeepSeek's System Prompt: Jailbreaking Generative AI

DeepSeek, a disruptive new AI model from China, has shaken the market, sparking both excitement and controversy. While it has gained attention for its capabilities, it also raises pressing security concerns. Allegations have surfaced about its training data, with claims that it may have leveraged models like OpenAI’s to cut development costs. Amid these discussions, one critical aspect remains underexplored—the security of AI agents and the vulnerabilities that allow for jailbreaks.

Guide: FedRAMP Requirements for Vulnerability Scanning

FedRAMP is a key part of maintaining the digital security of the federal government, by way of enforcing security rules across departments and the cloud service providers that work with them. Any CSP that wishes to work with a federal agency or department and handle controlled information needs to obtain an authority to operate (ATO) from the program management office. Part of that ATO is the continuous monitoring of the CSP’s systems to ensure ongoing security in a changing world.

What is a Third-Party Data Breach? 7 Recent Examples

A third-party data breach is a security incident where an organization's sensitive data is compromised or stolen due to a vulnerability or cyber attack on one of its third party vendors. This type of breach happens outside the primary organization's own IT infrastructure but still impacts them, as the third-party vendor, contractor, or service provider has access to their data.

Top 11 cyberattacks that impacted 2024

2024 is behind us, but the cybersecurity lessons it left behind are still highly relevant. Data breaches remain a persistent threat to large enterprises and government agencies, as the data they store is prized by organizations and a prized target for cybercriminals. Attacks have economic consequences and serious reputational and legal repercussions, putting business stability at risk.