Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How to Prevent a Subdomain Takeover in Your Organization

When was the last time you checked DNS configurations for subdomains pointing at services not in use? According to Crowdsource ethical hacker Thomas Chauchefoin, while expired and forgotten subdomains can easily become an entry point for an attacker to steal sensitive data and launch phishing campaigns, having the right tool in place can keep them at bay.

Introducing CelesTLSH: Advanced Malware Detection with Fuzzy Hashing

We are excited to announce the integration of the CelesTLSH Malware Scanner into the LimaCharlie ecosystem. Developed by Magonia Research, CelesTLSH enhances your security operations by scanning files collected via the BinLib extension. It identifies known malware and threat actor tools through advanced fuzzy hashing techniques.

Stop Demonizing CVSS: Fix the Real Problem

If you read the newest risk-based vulnerability management literature, it appears we have a new favorite punching bag: the Common Vulnerability Scoring System (CVSS). You seemingly can’t throw a rock into the “vuln-o-sphere” without hitting someone dunking on CVSS or the National Vulnerability Database (NVD). The argument goes something like this: “Exploitation rates are up, ransomware is surging, and vulnerabilities are multiplying like rabbits.

How PAM Reduces Cybersecurity Risks in Remote Work Environments

When organizations adopt remote work, they face increased cybersecurity risks. Privileged Access Management (PAM) helps mitigate these risks by reducing the attack surface, minimizing insider threats, and providing enhanced visibility and monitoring capabilities. Continue reading to learn the cybersecurity risks unique to remote work environments and how PAM helps address them.

CrowdStrike Researchers Explore Contrastive Learning to Enhance Detection Against Emerging Malware Threats

The process of crafting new malware detection features is usually time-consuming and requires extensive domain knowledge outside the expertise of many machine learning practitioners. These factors make it especially difficult to keep up with a constantly evolving threat landscape. To mitigate these challenges, the CrowdStrike Data Science team explored the use of deep learning to automatically generate features for novel malware families.

Why CASB Solutions Are Unsuitable for Detecting AI Usage in Organizations

Cloud Access Security Brokers (CASBs) are essential tools for many enterprises, acting as intermediaries between users and cloud services to provide visibility, enforce security policies, and ensure compliance. While CASBs excel at managing traditional SaaS (Software-as-a-Service) applications, they fall short when it comes to detecting and managing the use of AI tools within an organization.

Elevating Endpoint Security: Lookout Mobile Intelligence APIs

There’s no denying that mobile devices have become essential tools for employees — they facilitate communication and boost productivity by providing access to corporate resources from virtually anywhere. But that convenience comes at a cost. The role of the mobile device, in terms of how much can be done with them and the amount of data they can give users access to in a convenient and familiar form factor, has made them indispensable to the modern workforce.

Trustwave SpiderLabs: Ransomware Attacks Against the Energy and Utilities Sector Up 80%

The energy sector is a cornerstone of national security, ensuring the delivery of critical infrastructure services and supporting transportation systems. Recognizing the importance of protecting this vital industry, Trustwave SpiderLabs has released the comprehensive 2025 Trustwave Risk Radar Report: Energy and Utilities Sector.

11:11 Systems Receives Prestigious 2024 Zero Trust Security Excellence Award

The Greek philosopher Aristotle once remarked, “Excellence is never an accident. It is always the result of high intention, sincere effort, and intelligent execution.” When you’re winning, the thrill is undeniable. Success, whether in the casino or on the basketball court, requires focus and discipline. It’s a feeling like no other when everything finally clicks.

A Developer's Guide to Running an SCA Scan

Your IT infrastructure is a complicated network of systems and activities that generate massive volumes of data every second. Hidden within this data stream is the key to understanding your systems’ health and potential dangers. The dangers are significant, given that the average worldwide data breach costs an exorbitant $4.45 million. One such security breach can destroy your organization, resulting in legal fines, financial loss, and harm to your reputation.