Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How the Proposed HISAA Law Could Reshape Cybersecurity Compliance

It’s been a tough year for the healthcare sector. Throughout 2024, cybercriminals have unleashed a barrage of attacks on a vast number of healthcare organizations - with disconcerting levels of success. FBI research revealed that healthcare is now the US’s most targeted industry.

The View is Better from Here: Introducing a Brave New Veracode

The Latin “vera” indicates truth or reality. When Veracode was founded, this was the essence of our focus – finding truth in code. And specifically, binaries; hence the original brand rooted with the “01”. Seventeen years later, we remain committed to our vision – a World where software is developed secure from the start – but to do so today, we are expanding our view, solidifying our point of view, and modernizing how you see us.

The Secret to Your Artifactory: Inside The Attacker Kill-Chain

Artifactory token leaks are not the most common, but they pose significant risks, exposing sensitive assets and enabling supply chain attacks. This article explores the dangers of leaked tokens and proposes mitigation strategies, including token scoping and implementing least privilege policies.

Threat Context monthly: Executive intelligence briefing for January 2025

Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news and threat information from KrakenLabs, Outpost24’s cyber threat intelligence team. Here’s what you need to know from January.

Top 5 Strategies to Reduce Dwell Time with XDR: Accelerating Threat Detection and Response

Cyber adversaries operate with one goal in mind—stealth. The longer they go undetected in an environment, the more damage they can cause. Dwell time is the total amount of time that a threat remains unnoticed in a system, from initial compromise to discovery. According to the most recent threat reports, the average dwell time for undetected breaches has reduced but remains at 10-15 days, providing attackers enough time to exfiltrate data, launch ransomware, or establish persistent access.

The Future of Cloud Computing: What's Next for Businesses and Technology?

The future of cloud computing is expected to drive innovation, efficiency, and security in the future, transforming both organizations and technology. Faster processing, improved security, and more intelligent automation are becoming more and more necessary as businesses depend more and more on cloud infrastructure.

DeepSeek DDoS: Why AI Needs Machine Identity Security

Imagine a sleek, high-tech sports car racing downhill without brakes. Now, imagine that car is actually the AI driving your business. Powerful yet precariously close to catastrophe. That’s why, as we accelerate AI adoption, including AI agents, we can’t afford to overlook security guardrails. This fact was front and center during the recent “large-scale cyberattack” on DeepSeek, a strategic open-source AI player from China that’s been disrupting the global AI space.

Behind the scenes of Elastic Security's generative AI features

A quantitative approach to prompt tuning and LLM evaluation Elastic has long been developing machine learning (ML) and AI-powered security detections. We constantly bring in new technologies when available to help make our users’ lives easier. So, with the rise of generative AI (GenAI), we have developed even more Elastic Security features to use this powerful, new technology. Among those are.

What's new in Riscosity: January 2025

Riscosity’s premier capability to automatically act upon any data type that organizations’ products are sharing with 3rd party vendors has been enhanced even further to support SFTP traffic. Now, any data type going over SFTP to any 3rd party vendor can be automatically blocked, redacted, or notified about.

DeepSeek: A Deep-Dive into the Latest AI-powered LLM

DeepSeek is a Hangzhou-based startup founded in December 2023 by Liang Wenfeng. It released its first AI-based large language model in 2024. The company recently received widespread attention after releasing a new open-source AI model that rivals OpenAI’s work. The app shot to the top of the app stores’ downloads list and has sparked much interest.