Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Securing your CI/CD Pipelines with GitHub Actions: DevSecOps in Action

When people talk about securing software, they typically refer to two distinct aspects. The code itself, or the servers it runs on. That makes sense. Those are the most visible parts. But what actually holds everything together isn’t either of those. It’s the pipeline in between the system that moves code from an idea in a developer’s head to something running in production. CI/CD pipeline can be easy to overlook because it often feels invisible.

Corelight's enhanced threat detection: staying ahead of evasive threats

In today's rapidly evolving cybersecurity landscape, organizations face unprecedented challenges. Cyber threats are not only increasing in volume but are also becoming more sophisticated and evasive, using AI themselves to enhance their attacks. The attack surface has expanded dramatically, while Security Operations Centers (SOCs) are often left with fewer resources to combat these growing threats.

Modernize threat detection and SOC efficiency with integrated Corelight Threat Intelligence

In the ever-escalating battle against cyber threats, security teams are often caught in a deluge of alerts, struggling to distinguish real threats from the noise. The sheer volume of threat data can be overwhelming, leading to alert fatigue and, worse, missed detections. But what if you could really cut through the clutter and focus on what truly matters?

Policy, privacy and post-quantum: anonymous credentials for everyone

The Internet is in the midst of one of the most complex transitions in its history: the migration to post-quantum (PQ) cryptography. Making a system safe against quantum attackers isn't just a matter of replacing elliptic curves and RSA with PQ alternatives, such as ML-KEM and ML-DSA. These algorithms have higher costs than their classical counterparts, making them unsuitable as drop-in replacements in many situations.

Anonymous credentials: rate-limiting bots and agents without compromising privacy

The way we interact with the Internet is changing. Not long ago, ordering a pizza meant visiting a website, clicking through menus, and entering your payment details. Soon, you might just ask your phone to order a pizza that matches your preferences. A program on your device or on a remote server, which we call an AI agent, would visit the website and orchestrate the necessary steps on your behalf.

Beyond IP lists: a registry format for bots and agents

As bots and agents start cryptographically signing their requests, there is a growing need for website operators to learn public keys as they are setting up their service. I might be able to find the public key material for well-known fetchers and crawlers, but what about the next 1,000 or next 1,000,000? And how do I find their public key material in order to verify that they are who they say they are? This problem is called discovery.

What is TISAX certification? A 101 guide to compliance

With the rapid adoption of AI and automation technologies, the automotive industry is experiencing a massive transformation. From autonomous driving tech to vehicles connected with cloud-based services, these innovations are reshaping how automakers and suppliers operate globally. However, these shifts have introduced new vulnerabilities, especially cyber risks, that need to be addressed.

What is Swatting? How Fake Emergency Calls Turn Deadly

Cyber pranks have increased in the past few years. There is a fine line between playing a prank and harassing someone. People in the excitement of playing a prank often land themselves and others in trouble. On the other hand, some individuals harass others due to a dispute or revenge. On most occasions, victims narrowly escape the harassment against them, but sometimes, they pay severe consequences in the form of property damage, injury, or even death.

CVE-2025-59287: Critical WSUS Vulnerability Exploited in the Wild

In October 2025, Microsoft disclosed a critical remote code execution vulnerability (CVE-2025-59287) in Windows Server Update Services (WSUS), which enables unauthenticated attackers to gain full control over affected servers. WSUS is a central patch management tool in Windows environments, responsible for approving, distributing, and monitoring updates across corporate networks.

How to MFA Everywhere

What makes you, you? Is it your physical representation, your memories, your choices, your relationships? In the physical world, identity is deep and layered. But online, all of that is stripped away. To a computer, you are not your story. You are a login. You are a password, a cookie, or a session. You are a code sent to your phone. That is the entire test of your existence in the digital realm. Which means if someone else holds those same fragments, the system will treat them as you.