Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Sentinels of Ex Machina: Defending AI Architectures

The introduction, adoption, and quick evolution of generative AI has raised multiple questions about implementing effective security architecture and the specific requirements for protecting all aspects of an AI environment as more and more organizations begin using this technology. Recent security reports on vulnerabilities that expose Large Language Model (LLM) components and jailbreaks for bypassing prompting restrictions have further shown the need for AI defenses.

Implementing SBOM Security Best Practices

The concept of Software Bill of Materials (SBOM) has gained serious traction in recent years, emerging as a critical element of software security frameworks. SBOM refers to a comprehensive inventory of all the components and dependencies, or the software supply chain, that make up a software application. The influence of SBOM on modern software and application security programs is so compelling that government organizations like the U.S.

SecurityScorecard and AWS Help Make Secure Software Procurement Faster and Easier

Organizations increasingly rely on third parties for business operations, and as a result are working with more digital suppliers than ever. According to Gartner, 60% of organizations work with more than 1,000 third parties and this number will grow. High-profile vulnerabilities such as Log4Shell are a constant reminder of the risks posed by a breakdown in the software supply chain. This has spurred enterprises to increase the rigor of software risk assessments to ensure supply chain security.

Azure Just-in-Time Access Simplified

In today’s rapidly evolving cloud landscape, organizations are grappling with the intricate challenge of striking a delicate balance between ensuring robust cybersecurity measures and facilitating seamless operational efficiency. As cloud adoption continues to surge, the traditional approach of granting standing privileges to users has become an increasingly significant security vulnerability.

The Naver Deception: Analyzing Quasar RAT's Distribution through a Popular South Korean Platform

Quasar RAT, also known as xRAT, is a malicious remote access trojan (RAT) that primarily targets Windows systems. Developed as an open-source project around 2015, it quickly garnered attention in the cybersecurity community due to its flexibility and ease of modification. Quasar RAT allows cybercriminals to gain unauthorized remote access to infected computers, making it a potent tool for espionage and theft. How Quasar RAT Operates.

Azure Blob and Data Lake Gen2 Protection with Rubrik

Azure Blob storage is no longer used as a data dump. More and more organizations are placing mission-critical data within it and building applications around it. At the same time, cyberattacks are on the rise, and Azure Blob is not immune. With Rubrik, you can ensure your Azure Blob and Data Lake Gen2 data is resilient and recoverable from cyberattacks and operational failures while taking advantage of.

What Is ITDR?

Gartner listed identity threat detection and response (ITDR) among its top security and risk management trends for 2022 and beyond — and study after study keeps verifying the importance of an effective ITDR strategy. For example, the Identity Defined Security Alliance (IDSA) revealed that more than 90% of the organizations it surveyed suffered an identity-related attack in 2023, and a 2024 IBM report found that attacks using stolen credentials increased by 71% year over year.

Brand Impersonation of Microsoft Increases 50% in One Quarter

The use of the Microsoft brand in phishing attacks demonstrates both its widespread credibility as well as the continued success of attacks leveraging it. Each quarter, security vendor Check Point builds its’ Brand Phishing Ranking, identifying the top ten impersonated brands used in phishing attacks. And, while we’ve seen Microsoft at the top of this quite a few times before in their previous rankings, it’s the growth we see in their latest report covering Q2.