Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

AWS WAF vs. AppTrana WAF

AWS WAF, a widely used security tool from Amazon Web Services, is a web application firewall designed to safeguard web application servers against various online threats. The tight integration of AWS WAF with key AWS services, including Amazon CloudFront CDN, Application Load Balancer (ALB), and Amazon API Gateway, ensures a comprehensive security approach. AWS WAF can also protect services offered by other providers as long as the content is delivered via the CloudFront distribution network.

The Growing Threat of Identity-Related Cyberattacks: Insights Into the Threat Landscape

The last 12 months have witnessed a rapid-fire round of innovation and adoption of new technologies. Powerful new identities, environments and attack methods are shaping the quickly changing cybersecurity threat landscape, rendering it more complex and causing the diffusion of risk reduction focus. New CyberArk research indicates that the rise of machine identities and the increasing reliance on third- and fourth-party providers are deepening the existing threats and creating novel vulnerabilities.

Splunk SOAR Playbook of the Month: Splunk Attack Analyzer Dynamic Analysis

Alert triage can be a very cumbersome and time consuming process for SOC teams. Our recent State of Security report found that 26% of respondents agree that the volume of alerts they deal with makes it difficult to keep up with addressing emergencies. While tools like virtual sandboxes can help analysts better test and understand the severity of the threats they encounter, the process of testing and documenting results can add further tedium to an already prolonged process.

Cyber Threat Intelligence Update: Data Breach, Ransomware Trends, and Emerging AI Threats

This blog provides a comprehensive update on a major data breach at the UK Ministry of Defence, a strategic shift in ransomware targets towards smaller businesses, and the increasing utilisation of generative AI in cybercrime.

From Doodles to Masterpieces: How AI Art Generators Transform Sketches into Art

Artificial Intelligence (AI) has permeated nearly every aspect of our lives, from powering virtual assistants to driving autonomous vehicles. However, one of the most intriguing applications of AI is in the realm of art generation. With the emergence of free AI art generators and background removers, individuals now have the power to transform simple doodles into stunning masterpieces with just a few clicks. In this article, we delve into the world of AI-generated art, exploring its capabilities, implications, and the creative freedom it offers to artists and enthusiasts alike.

ManageEngine Endpoint Central takes home 5 Global InfoSec Awards 2024

What an exciting way to start the month! We’re thrilled to announce that ManageEngine has received 12 Global InfoSec Awards from Cyber Defense Magazine. Among these accolades, five recognize our innovative Unified Endpoint Management and Security solution, Endpoint Central.

Offensive Security Services: How to Improve Security by Thinking Like an Adversary

Taking a proactive approach to cybersecurity is essential for safeguarding sensitive data and systems from potential threats. By adopting an offensive security strategy, organizations can identify and mitigate vulnerabilities and risks before they are exploited by malicious actors.

FBI Warns of AI-Assisted Phishing Campaigns

The US Federal Bureau of Investigation’s (FBI’s) San Francisco division warns that threat actors are increasingly using AI tools to improve their social engineering attacks. “AI provides augmented and enhanced capabilities to schemes that attackers already use and increases cyber-attack speed, scale, and automation,” the FBI says.