Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How Popular Malware Is Stealing Credentials and What You Can Do About It

Credentials are prime targets for attackers, as they make it easy to access resources as legitimate users without discovering vulnerabilities or using technical exploits. Malware authors know how interesting these low-hanging fruits are and are coming after your secrets!

Critical Vulnerabilities Patched in Veeam Products

On September 4, 2024, Veeam released a security bulletin announcing that they have fixed several vulnerabilities affecting various Veeam products. Arctic Wolf has highlighted five of these vulnerabilities, which are classified as critical. Arctic Wolf has not observed any exploitation of these vulnerabilities in the wild and has not identified any publicly available proof of concept (PoC) exploit code.

Protecting NATO Secret and Foreign Government Information

We’ve talked a lot on this blog about protecting controlled unclassified information, and we’ve mentioned in places some other kinds of information, like classified and secret information, covered defense information, and other protected information. There’s one thing all of this information has in common: it’s generated by the United States government.

Evolution of Scalper Bots Part 3: Expansion into New Markets

Welcome back to the next blog in our Evolution of Scalping series. During our last blog we covered the landmark case that exposed the power of automated purchasing – Wiseguy Tickets. We detailed their operation and their use of bots, which allowed them to snatch up huge volumes of available tickets for high-demand events.

Your Return on Investment: Veracode Dynamic Analysis

Demonstrating Return on Investment (ROI)—showing how your security investments translate into tangible business value—helps assess their impact. Veracode Dynamic Analysis enables you to deliver secure software that aligns with business goals such as reducing risk, cutting costs, and saving time. To see the potential business value of Veracode Dynamic Analysis for your organization, check out our ROI calculator.

5 Steps to Send An Encrypted Email in Gmail

These days, we use Gmail for everything from customer service to telehealth. Over time, your Gmail account might become a treasure trove of sensitive PII, PCI, PHI, and passwords that hackers can leverage. In fact, as of this year, just under half of all data breaches involve email. So, what can you do to protect your inbox? Enter: email encryption.