Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Hypervisor Encryption: Shutting Down Recovery

Ransomware isn’t just about locking files anymore; attackers like Scattered Spider can take entire backup systems offline. Joe Hladik explains how hypervisor encryption lets them access virtualization interfaces and encrypt entire ESXi clusters, leaving organizations with no way to recover. Joe lays out why this tactic is so dangerous: it turns a backup, your last line of defense, into another point of failure.

When Firewalls Age Out: What the Akira Attack Can Teach Us About Lifecycle Security

Cyberattacks evolve faster than aging infrastructure can keep up, and expired hardware is one of the biggest blind spots organizations face today. The recent Akira ransomware campaign targeting SonicWall VPNs is a powerful reminder of what happens when devices slip out of support.

Beyond manual forensics: Booking.com's approach to orchestrating incident response

Browser history can play a critical role in incident response, from helping analysts reconstruct user activity and validating alerts, to uncovering malicious behavior. But retrieving raw artifacts from endpoints is often slow, manual, and inconsistent. In this technical session, Ahmad Aziz, Security Engineer II at Booking.com, will share his winning entry from the 2024 “You Did WHAT?! With Tines” (YDWWT) competition: a fully automated workflow that pulls raw browser history artifacts from devices using CrowdStrike and prepares them for offline forensic analysis.

Episode 4: Bring automation to the heart of your privileged access workflows with PAM360

Enterprise security isn’t just about controlling who gets access. It’s about making those access workflows efficient, consistent, and free from error. In this episode of the PAM Masterclass, we’ll walk you through how PAM360 transforms repetitive admin work into automated, policy-driven workflows. It covers how to grant access only when required, revoke it automatically, and manage critical administrative tasks without manual effort, all while strengthening the organization’s security posture.

When Attackers Weaponize AI and Defenders Fight Back with Smarter Remediation

Artificial intelligence is transforming cybersecurity, and not always for the better. Attackers are now weaponizing AI to speed up reconnaissance, create exploit code, and bypass traditional defenses. Security teams can’t afford to rely on outdated vulnerability management practices. In this webinar, Scott Kuffer (COO, Nucleus Security) and Corey Brunkow (Director of Federal Operations, Horizon3.ai) break down how AI is changing the threat landscape and what defenders can do to stay ahead.

Zero Assumptions: A Data Science & Threat Intel Roundtable

How do data science and threat intelligence intersect to strengthen defenses in today’s evolving cyber landscape? Join us this Wednesday, September 24 at 10 AM ET for a special edition of Arctic Wolf SOCast: Zero Assumptions, where our experts will break down how advanced analytics and threat research work hand-in-hand to outpace attackers. Featuring.