Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Security Trifecta: Operationalizing API Protection with AWS, Wallarm, and Coralogix

In the modern digital world, API’s are no longer just “connectors” – they are the real security product. Whether you are a Fintech processing payments, a SaaS platform managing multi-tenant data, or an E-Commerce giant handling the bulk of sales, your API’s are the foundation of your customer registration, checkout experiences, and partner ecosystems. However, that transition has made API’s the fastest-growing attack surface in history.

Agent-First Observability: Dynamic Data, High Cardinality, and the Business Impact

We want to transform how companies make decisions. That is not what you expect to hear from an observability company. Observability tools are supposed to help you monitor systems, debug incidents, and maybe reduce downtime. Useful, but not exactly the foundation for business decision making. So what does observability have to do with revenue, churn, or customer experience? More than you think, because observability already sits on top of the most important data in your business.

Evil Token: AI-Enabled Device Code Phishing Campaign

On April 6, 2026, Microsoft Defender Security Research published an advisory detailing a large-scale phishing campaign that leverages the OAuth Device Code Authentication flow to compromise Microsoft 365 accounts across organizations globally. This campaign represents a significant evolution from manual social engineering to fully automated, AI-driven attack infrastructure.

Slack, Teams & Google Chat in Your SIEM: Why Collaboration Audit Logs Matter

The modern workplace has a new “system of record,” and it isn’t email. Today, approvals, incident coordination, customer escalations, vendor conversations, quick file shares, and “can you grant access?” requests happen in Slack channels, Teams chats, and Google Chat spaces, often at a pace that makes formal controls feel optional.

The AWS logs you miss during an incident

Incident response in the cloud is derailed not by a lack of skill, but by a lack of visibility. Security teams frequently discover critical blind spots only after an incident is already underway, leading to delayed containment, inaccurate attribution, and incomplete forensic analysis. This report walks through six realistic, real-world inspired scenarios where missing log sources prevented effective investigations.

AWS GuardDuty Modules Explained: Features, Coverage, and How Customers Benefit with Coralogix

As organizations continue to scale their AWS environments, security teams face increasing challenges in detecting cloud-native threats such as compromised credentials, misused APIs, container breaches, and malicious workload behavior. Traditional perimeter-based controls and legacy endpoint tools are often insufficient in dynamic, cloud-first architectures. AWS GuardDuty provides native,intelligent threat detection for AWS environments.

Hybrid Cloud Defense Grid: Bridging Wiz and Runtime Telemetry

The modern cloud security landscape is often fighting a war on two disconnected fronts. On one side, we have Cloud Security Posture Management (CSPM) platforms like Wiz, which act as the cartographers of risk—mapping terrain with high fidelity to identify open ports, unpatched vulnerabilities, and toxic permission combinations. On the other hand, we have Runtime Defense tools (SIEM, EDR, NGFW) that generate massive streams of activity logs.

A Milestone for Government AI: Coralogix Begins FedRAMP Journey

Today Coralogix announced U.S. Department of Education Sponsorship for FedRAMP Authorization. Government agencies currently face a critical balancing act. On one side, there is an urgent mandate to modernize operations and adopt artificial intelligence to improve services. On the other, there are strict requirements for security, compliance, and data sovereignty that cannot be compromised.

MongoBleed (CVE-2025-14847): Critical Unauthenticated MongoDB Memory Disclosure

A critical vulnerability identified as CVE-2025-14847 (dubbed “MongoBleed“) affects MongoDB Server instances, exposing systems to unauthenticated information disclosure. This vulnerability allows a remote attacker to read sensitive data from the server’s memory without requiring authentication.

Threat hunting with Olly

Effective threat hunting requires both comprehensive visibility and quick, data-driven insights. Olly, the AI-powered observability teammate within Coralogix, provides just that. Whether you’re tracking lateral movement, uncovering stealthy persistence, or correlating spikes in anomalous activity, Olly rapidly pinpoints the evidence and presents it in context so you can confirm or dismiss threats before they escalate.