Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Kings of Brute-Force and DDoS: Meet KillNet

Traditionally Hacktivists were thought of as ideologically motivated threat actors, unaffiliated with nation-states. However recently according the Cyberint research, the lines have blurred. There are now several Hacktivist groups who align with specific nation-states. One example is the KillNet Hacktivist Group. KillNet is a hacktivist group aligned with Russia, who gained significant attention at the onset of the Russia-Ukraine conflict.

Aikido Security raises Euro5m to offer a seamless security solution to growing SaaS businesses

Aikido Security, the developer-first software security app for growing SaaS companies, today announces it has raised €5m in a Seed round co-led by Notion Capital and Connect Ventures; with investment from Inovia Capital Precede Fund I, led by partners Raif Jacobs and former Google CFO Patrick Pichette; as well as an impressive roster of angel investors including Christina Cacioppo, CEO of Vanta.

Less than half of UK businesses have strong visibility into security risks facing their organisation

Vanta State of Trust report reveals only 9% of the average UK company's IT budget is dedicated to security despite rising risk of cyber attacks. 78% of UK leaders already using AI/ML in some capacity to detect security risks but nearly 6 in 10 say regulation would increase investment.

Insider Risk Management for Your Cloud Infrastructure: Why Do You Need an IRM Program?

Organizations use more and more cloud services these days to improve business efficiency and achieve working flexibility for remote employees. However, keeping up with reliable cybersecurity measures in such a cloud-dependent world becomes challenging. And one of the reasons for that is the increase in insider risk. In this article, we explore the major insider risks in cloud infrastructure and discuss the importance of IRM program for cloud security.

Detecting account compromise with UEBA detection packages

The Elastic InfoSec Threat Detection team is responsible for building, tuning, and maintaining the security detections used to protect all Elastic® systems. Internally, we call ourselves Customer Zero and we strive to always use the newest versions of our products. This blog details how we are building packages of detection rules that work together to create a high fidelity alert for strange user behavior.

Weather Forecast: Money Is Going to Rain from the Cloud

Since the start of Bitcoin in 2009, the popularity and prevalence of cryptocurrencies has exploded, resulting in a net worth of over $1 trillion that continues to grow. Cryptocurrency—held in virtual wallets—is obtained by users who purchase coins on a cryptocurrency exchange, receive coins as payment from someone else, or “mine” coins virtually themselves.

DDoS attacks have increased by 40% over the last six months

Distributed denial-of-service (DDoS) attacks have been around for a long time. However, the sophistication and scale of these threats has grown in recent years. Cybercriminals are employing amplification techniques that exploit vulnerabilities in misconfigured services or network protocols to increase the traffic they can generate and maximize the impact of their attacks.

Announcing Ruby - your new Generative AI companion for Data Security

Say hello to Ruby, your new Generative AI companion for the Rubrik Security Cloud. Ruby is designed to simplify and automate cyber detection and recovery, something that IT and Security teams struggle with as cyber incidents are getting wildly frequent and the attacks are evolving quickly. A study by Rubrik Zero Labs revealed that 99% of IT and Security leaders were made aware of at least one incident, on average of once per week, in 2022.