Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Blogs

How Security Edge Revolutionizes API Security

Wallarm’s Security Edge is setting a new standard in API security—far beyond the reach of traditional Content Delivery Networks (CDNs). Let’s get it straight: Security Edge is not just a new addition to the API security market; it’s a disruption. Designed to deliver fast, effective, and advanced API protection where APIs need it, Wallarm’s Security Edge targets what CDNs cannot.

How Generative AI is Transforming Application Security

Application security has transformed from being an afterthought to a central focus as threats have evolved. What was once about securing code has expanded to protecting the entire application lifecycle. The rise of cloud-native architectures, microservices, and APIs has broadened the attack surface, requiring security teams to rethink their approaches.

Arctic Wolf Labs Observes Increased Fog and Akira Ransomware Activity Linked to SonicWall SSL VPN

In early August, Arctic Wolf Labs began observing a marked increase in Fog and Akira ransomware intrusions where initial access to victim environments involved the use of SonicWall SSL VPN accounts. Based on victimology data showing a variety of targeted industries and organization sizes, we assess that the intrusions are likely opportunistic, and the threat actors are not targeting a specific set of industries.

CVE-2024-47575: Critical Vulnerability in FortiNet FortiManager Under Active Exploitation

On October 23, 2024, Fortinet published an advisory disclosing an actively exploited vulnerability (CVE-2024-47575) affecting FortiManager and FortiManager Cloud. The critical-severity vulnerability can be exploited on FortiManager instances exposed to the internet via port 541. Successful exploitation could allow a remote, unauthenticated threat actor to execute arbitrary code or commands via specially crafted requests.

Understanding Human Risk in Cybersecurity

One of the most challenging elements of securing an organization from cyber threats is ensuring that their employees aren’t placing themselves or their colleagues at risk. But as Arctic Wolf’s new Human Risk Behavior Snapshot shows, even security practitioners and IT leaders aren’t always model citizens when it comes to mitigating their own cyber risk.

Corporate Fraud: Detection, Prevention, and the Role of Corporate Fraud Attorneys

The growing scale of organizations and the more opportunities to push the boundaries have led to an upsurge in corporate fraud in recent years. Fraud can be a deceptive action taken against a company or one carried out by the company. A company could commit fraud in many ways to improve its industry reputation and defend itself from audits. On the other side, a company may become a victim of financial statement fraud, asset theft, and corruption committed by its staff members.

Ensuring Classified Data Doesn't End Up Public Using Data-centric Zero Trust

This week, the FBI announced it is investigating a classified data leak of U.S. intel on Israel’s plans to retaliate against Iran. The top-secret documents were exposed on the Telegram messaging app, and it’s unclear if it was a leak or hack. The investigation will center on the Defense Department’s National Geospatial-Intelligence Agency, which manages the country’s network of spy satellites and anyone with access to the classified document.

9 Leading Data Protection Alternatives to Metomic

When it comes to building a comprehensive data security strategy, everything hinges on finding and accurately classifying all your sensitive data. It seems security professionals have finally given up on legacy solutions that require extensive labeling and manual data mapping — and not a moment too soon. We're confident no one will mourn the passing of legacy solutions.