Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Attackers Are Bypassing PowerShell Protections

PowerShell is one of the most popular platforms for malicious actors. To protect your critical data and systems, it’s vital to implement strategies for blocking and detecting attacks that exploit PowerShell. However, you should not assume those security measures are airtight — adversaries are constantly looking for ways to bypass your defenses. Let’s explore three of those techniques, so you can build an even more robust strategy for defending your data and your business.

The Evolution of NDR: From IDS to Advanced Threat Detection

It is always important to be one step ahead of cyber attackers. The tools and methods used to protect computer networks need to keep improving to match the growing cyber threats. One big change in this area is moving from old-fashioned Intrusion Detection Systems (IDS) to newer Network Detection and Response (NDR) solutions. This blog will look at how IDS has changed into NDR, emphasizing their main differences and the better features NDR offers.

Announcing new Snyk AppRisk integration with Orca Security

We’re excited to announce a new Snyk AppRisk integration with Orca Security that brings the best of two worlds together: developer-loved, security-trusted application security from Snyk and leading cloud security from Orca. This integration is big news for organizations looking to align with DevSecOps and enhance collaboration between development and security teams.

How to mitigate security issues in GenAI code and LLM integrations

GitHub Copilot and other AI coding tools have transformed how we write code and promise a leap in developer productivity. But they also introduce new security risks. If your codebase has existing security issues, AI-generated code can replicate and amplify these vulnerabilities.

Customers get increased integration with Cloudflare Email Security and Zero Trust through expanded partnership with CrowdStrike

Today, we’re excited to expand our recent Unified Risk Posture announcement with more information on our latest integrations with CrowdStrike. We previously shared that our CrowdStrike Falcon Next-Gen SIEM integration allows for deeper analysis and further investigations by unifying first- and third-party data, native threat intelligence, AI, and workflow automation to allow your security teams to focus on work that matters.

Insider Threats: The Hidden Enemy Within Financial Services

Financial services organizations already face a dizzying array of external threats, but just as dangerous and often harder to spot are the threats posed by people inside their firm, according to the Trustwave SpiderLabs' Financial Services Deep Dive: Insider Threat. The report noted that insider threat attacks have become more common over the past year, with 40% of organizations reporting more frequent insider threat attacks compared to previous years.

How Scalper Bots Evaded Detection to Snatch Oasis Tickets

At 8:00 on Saturday, 31st August 2024, millions of people were poised to be part of pop culture history. Four days earlier, on 27th August, seminal Britpop heavyweights Oasis shocked the music world by finally confirming their long-awaited reunion. The reconciliation of brothers Liam and Noel Gallagher sent fans into a frenzy. For millions worldwide, it was essential to get tickets to one of the 17 announced gigs. The demand was enormous.

How Manufacturing Organizations Can Increase Their Cybersecurity

When Clorox was hit with a ransomware attack in 2023, the impact went beyond just the infected endpoints. Threat actors succeeded in taking many of the organization’s automated systems offline and impacted large retailers’ ability to order products from the manufacturer. There was significant operational downtime as it took Clorox over a month to contain the breach, and the resulting financial loss was in the tens of millions.