Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Understanding Human Risk in Cybersecurity

One of the most challenging elements of securing an organization from cyber threats is ensuring that their employees aren’t placing themselves or their colleagues at risk. But as Arctic Wolf’s new Human Risk Behavior Snapshot shows, even security practitioners and IT leaders aren’t always model citizens when it comes to mitigating their own cyber risk.

CVE-2024-47575: Critical Vulnerability in FortiNet FortiManager Under Active Exploitation

On October 23, 2024, Fortinet published an advisory disclosing an actively exploited vulnerability (CVE-2024-47575) affecting FortiManager and FortiManager Cloud. The critical-severity vulnerability can be exploited on FortiManager instances exposed to the internet via port 541. Successful exploitation could allow a remote, unauthenticated threat actor to execute arbitrary code or commands via specially crafted requests.

Arctic Wolf Labs Observes Increased Fog and Akira Ransomware Activity Linked to SonicWall SSL VPN

In early August, Arctic Wolf Labs began observing a marked increase in Fog and Akira ransomware intrusions where initial access to victim environments involved the use of SonicWall SSL VPN accounts. Based on victimology data showing a variety of targeted industries and organization sizes, we assess that the intrusions are likely opportunistic, and the threat actors are not targeting a specific set of industries.

How Generative AI is Transforming Application Security

Application security has transformed from being an afterthought to a central focus as threats have evolved. What was once about securing code has expanded to protecting the entire application lifecycle. The rise of cloud-native architectures, microservices, and APIs has broadened the attack surface, requiring security teams to rethink their approaches.

How Security Edge Revolutionizes API Security

Wallarm’s Security Edge is setting a new standard in API security—far beyond the reach of traditional Content Delivery Networks (CDNs). Let’s get it straight: Security Edge is not just a new addition to the API security market; it’s a disruption. Designed to deliver fast, effective, and advanced API protection where APIs need it, Wallarm’s Security Edge targets what CDNs cannot.

Asia-based SMBs: leverage logs to enhance cloud security and scale your operations

As small and mid-sized businesses (SMBs) across Asia adopt cloud technologies to accelerate growth, securing your cloud infrastructure becomes a significant challenge. The complexities of managing cloud environments, regulatory compliance, and ensuring real-time threat detection require robust solutions that are both scalable and cost-effective.

All About RAG: What It Is and How to Keep It Secure

AI is growing in power and scope and many organizations have moved on from “simply” training models. In this blog, we will cover a common system of LLM use called Retrieval-Augmented Generation (RAG). RAG adds some extra steps to typical use of a large language model (LLM) so that instead of working off just the prompt and its training data, the LLM has additional, usually more up-to-date, data “fresh in mind”.

How to Overcome the Security Questionnaire Burden

If you’re on the frontlines of your organization’s cybersecurity department, you’ve likely found yourself burdened by security questionnaires. Whether you’re in charge of evaluating vendor responses or completing questionnaires yourself, it’s no secret these requests can be time-consuming for everyone involved. Well, what if this didn’t have to be the case?

What are Source Code Leaks? Detect & Prevent Source Code Exfiltration

Source code leaks refer to the process in which the source codes of proprietary applications are made available to unauthorized persons or the public domain for various reasons. This might happen in several scenarios, including when information is leaked through public repositories, hacking attacks, internal threats, or when it is posted in version control systems.