Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Mend.io and JetBrains Partner to Bring Enhanced Code Security to Developers

At Mend.io, we’re passionate about code security. That’s why we’re thrilled to announce a strategic partnership with JetBrains that integrates Mend.io’s robust security solutions directly into JetBrains IDEs and Qodana environments. With the help of Mend.io, JetBrains users will now have access to robust Software Composition Analysis (SCA) and malicious package detection.

Inside the Belsen Group Attack: 15000 FortiGate VPN Credentials and Configurations Exposed

It was in January 2025 when a disaster leakage of data was leaked having more than 15,000 configuration files carrying VPN credentials leaked from FortiGate devices spread on several devices. It depicts acute problems inside organizations using the products by Fortinet about a higher need for an excellent security approach. The Belsen Group, the hacking collective carried out this attack by taking advantage of the zero-day vulnerability known as CVE-2022-40684.

Now Available: Evidence Collection with JFrog

There is an increasing need for traceability and attestation of the actions taken as software moves across the SDLC. Emerging regulations and policies around secure software development are rapidly evolving, and it’s important to stay ahead of the changing landscape. Some organizations have taken a proactive approach with home-grown solutions or manual processes, but despite best efforts, these solutions often lack scale and eventually falter over time.

3 Critical Cybersecurity Gaps Affecting GovCons

Government contractors handling Controlled Unclassified Information (CUI) for the Department of Defense must navigate complex compliance requirements. Central to these requirements is the Cybersecurity Maturity Model Certification (CMMC), which mandates conformance to NIST SP 800-171 and DFARS 252. This framework encompasses 110 security requirements across 14 security domains, including Access Control, Audit and Accountability, Risk Assessment, Incident Response, and several others.

Information Security Risk Management: A Comprehensive Guide to Protecting Your Data

In an age where data breaches make headlines almost daily, safeguarding sensitive information has never been more crucial. The rapid advancement of technology has made our personal and professional data vulnerable, raising the stakes for effective security measures. Information Security Risk Management (ISRM) emerges as a necessary framework to defend against these escalating threats.

AI-Driven Case Management Built for the Modern Security Team

Case management for modern SOCs can be a maze of endless alerts, overwhelming data, and intense pressure. Legacy solutions often exacerbate these issues with rigid workflows, limited automation capabilities, and a lack of real-time adaptability, leaving teams ill-equipped to handle the growing complexity of threats. The volume of cases, manual workflows, and processes leave analysts overwhelmed, exhausted, and struggling to keep pace.

What Does The NIS2 Directive Mean for Cybersecurity in the EU?

With the growing cyberattacks threatening business and customer data, Chief Information Security Officers (CISO) are working to implement the NIS2 Directive into their organization to strengthen their digital security. NIS2 is mandatory for all medium-sized and large organizations within vital sectors in the EU.

Record-breaking 5.6 Tbps DDoS attack and global DDoS trends for 2024 Q4

Welcome to the 20th edition of the Cloudflare DDoS Threat Report, marking five years since our first report in 2020. Published quarterly, this report offers a comprehensive analysis of the evolving threat landscape of Distributed Denial of Service (DDoS) attacks based on data from the Cloudflare network. In this edition, we focus on the fourth quarter of 2024 and look back at the year as a whole.

New Operating Models of Digital Asset Trading

‘Traditional’ equities trading has undergone massive transformation over centuries. The evolution of how trades are conducted reflects technological advancements, market demands, and the need for efficiency. From the establishment of stock exchanges to the emergence of electronic communication networks (ECNs), the journey from disruption to adoption paints a clear picture of the changing landscape.