Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Top tips: Are you using cyber deception? Here's why you should

Top tips is a weekly column where we highlight what’s trending in the tech world and list ways to explore these trends. This week, we focus on ways to stop attackers and safeguard your organization. It’s a classic warfare method to thwart attacks: deception. Enemies use deception tactics to combat their foes on the battlefield, and it’s a method that’s all too common. But deception in technology? What exactly is that? Is it even a standard practice? It very much is.

The Dark Playbook: Cyber Threats, IntelBroker Exploits, Supply Chain Attacks, and Infostealers

Advanced cyberattacks by adversaries who maximize the impact using the combination of sophisticated tools and methods are the norm. Some of the most dangerous strategies are integrating supply chain attacks, infostealer malware, and infamous threat actors, including IntelBroker and CyberNiggers. The above-mentioned groups typify the growing landscape of the cyber threat that makes use of collaboration, sophisticated tools, and strategic exploitation of vulnerabilities.

Redacting Message Fields for Privacy Purposes

Many organizations today have strict data privacy regulations that they must comply with. These privacy regulations can often clash with the requirements of security, application and operations teams who need detailed log information. This how to guide walks you through redacting message fields for privacy purposes. At Graylog, many of the organizations who use our tool are logging sensitive data that may contain personally identifiable information, health related data or financial data.

Opportunities & Risks for Digital-first Leaders in Business-led IT

In the digital era, the ability to adopt and integrate technology quickly has become a key driver of business success. Technology decisions are increasingly being made outside IT organizations as cloud-based tools, SaaS platforms, and low-code/no-code solutions become more accessible. Known as business-led IT, this trend democratizes technology, empowering business leaders to innovate independently.

The Top 10 Reasons People Fail a CMMC Audit

The Cybersecurity Maturity Model Certification, version 2.0, is finally in effect, which means thousands of businesses that have roles in the Department of Defense supply line need to do the work to comply and pass their audits to receive certification. It’s inevitable that many of these businesses will fail their initial audits. The standards are high, the margin of error is narrow, and the timeline is tight.

Migrating to Cloud? A Complete Cloud Network Security Checklist

Migrating to the cloud is no longer just an option for businesses—it’s a strategic necessity in today’s digital landscape. The cloud offers unparalleled scalability, flexibility, and cost-efficiency, but it also presents a unique set of cloud network security challenges. A misstep in securing your network during migration can expose sensitive data, disrupt operations, and impact compliance.

Console Chaos: A Campaign Targeting Publicly Exposed Management Interfaces on Fortinet FortiGate Firewalls

In early December, Arctic Wolf Labs began observing a campaign involving suspicious activity on Fortinet FortiGate firewall devices. By gaining access to management interfaces on affected firewalls, threat actors were able to alter firewall configurations. In compromised environments, threat actors were observed extracting credentials using DCSync.

Why Vulnerability Scanning Alone Isn't Enough: The Case for Penetration Testing

Organizations today face a rapidly evolving threat landscape, and as they plan their cybersecurity strategy and budgets, many may struggle with a key question: If I’m conducting regular vulnerability scans, and patching the vulnerabilities I identify, do I really need penetration tests as well? The answer is yes. While vulnerability scanning plays a vital role in identifying risks and vulnerabilities, relying solely on it for security creates blind spots.

Ivanti Discloses Active Exploitation of Zero-Day Vulnerability

Ivanti has disclosed vulnerabilities affecting Ivanti Connect Secure (ICS), Ivanti Policy Secure (IPS) and Ivanti Neurons for Zero Trust Access (ZTA) Gateways. According to Ivanti, CVE-2025-0282 has been exploited on a limited number of ICS appliances. There are no confirmed reports of exploitation for Ivanti Policy Secure or ZTA Gateways. There is no indication that CVE-2025-0283 is actively exploited or chained.