Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Breaking caches and bypassing Istio RBAC with HTTP response header injection

After our recent successes exploring WebSocket Hijacking vulnerabilities, we decided to expand this research project into other attacks that involve WebSockets. We started by looking at WebSocket smuggling attacks and expanded our scope to include HTTP response header injection attacks and potential novel impacts.

Cato's game-changing MSASE Partner Platform: Because service providers also needed a break

Managed service providers tell us they see great opportunity from so many businesses migrating to SASE. But many struggle to take advantage of it. Why is that? In this post, we’ll examine why service providers can find it hard to build a Managed SASE (MSASE) service, and four things they need when launching one.

4 Examples of How AI is Being Used to Improve Cybersecurity

Throughout history, technology has been a catalyst for solving many civilizational problems. The advent of artificial intelligence (AI) presents an incredible opportunity to combat cybersecurity risks and bolster the defenses of organizational IT networks. The good news is that it’s already making an impact by reducing the average dwell time of cyber attacks by as much as 15%. But AI holds much more promise.

The Future Of AI At Arctic Wolf

Arctic Wolf is addressing the exponential scale of security threats to business worldwide with our fusion of human intelligence, artificial intelligence, and one of the world’s largest data-streams of security observations. Join Arctic Wolf’s Dan Schiappa, Chief Product Officer, and Ian McShane, Vice President of Product, as they share their vision for AI in the context of the industry-leading Arctic Wolf Security Operations Cloud.

Fireblocks x TRES Finance: Enabling full financial visibility for Web3 companies

As regulation and reporting requirements become increasingly stringent, it’s more important than ever for organizations to have powerful, streamlined access to Web3 accounting and financial data. To meet the growing demand in this space, Fireblocks has teamed up with TRES Finance to offer customers the ability to completely automate Web3 accounting, taxes, and auditing.

Understanding the Cyber Risks in Video Communication

With the surge in remote work and virtual meetings, video communication is crucial for businesses and individuals. However, this convenience comes with significant cyber risks that can compromise sensitive information and privacy. Therefore, this article explores the common cyber threats in video communication and provides strategies to mitigate them.

Meeting the 555 Benchmark

How long does it take your security teams to detect a potential threat, correlate relevant data, and initiate a response action? The 555 Benchmark for Cloud Detection and Response challenges organizations to detect a threat within 5 seconds, correlate data within 5 minutes, and initiate a response within 5 minutes. It is not just something you can implement or use to solve your cloud security struggles. It is about testing and improving your cloud security operations and processes.