Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

EMBER2024: Advancing the Training of Cybersecurity ML Models Against Evasive Malware

CrowdStrike data scientists are members of a team of cybersecurity researchers that recently released EMBER2024, an update to EMBER, the popular open source malware benchmark dataset originally released in 2018. The EMBER2024 dataset includes metadata, labels, and calculated features for over 3.2 million files from six different file formats.

10 Budget Moves to Protect Against Ransomware

Protecting your business from ransomware doesn't require an unlimited budget, but it does take careful planning. Cyberattacks grow more advanced each year. Ignoring preparedness could result in massive downtime or data loss. Investing in the right defenses reduces risk without overspending. Knowing where to allocate funds can mean the difference between prevention and recovery costs spiraling out of control. Here are nine actionable investments with real-world impact to safeguard your organization while keeping budgets in check.

Defeating Ransomware with Unified Security

Ransomware is getting smarter, so your security better be, too. The old playbook of scattered tools and siloed defenses no longer cuts it. Every business needs to connect the dots to stay ahead. In this webinar, we’ll show you how bringing together SASE, XDR, NDR, and automation under a unified platform creates a powerful security force that works with your team, not against it.

Google Saved the Day: How Search Solved a Ransomware Alert #appsec

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Intel Chat: Trend Micro Apex One, PyPI domains, RingReaper & Openbaar Ministrie attack [244]

In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community. Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

Cloud Ransomware Attack: Storm-0501's Azure Tactics and How to Defend

Cloud adoption has transformed how organizations store and secure critical data—but it has also created new opportunities for attackers. A recent campaign by Storm-0501, a financially motivated ransomware group, highlights how devastating a cloud ransomware attack can be when backups and recovery measures fail.

Cloud Ransomware: How Storm-0501 Hackers Are Redefining Data Extortion

Ransomware is no longer confined to on-premise networks. A recent report from Microsoft reveals how Storm-0501, a notorious threat group, has pivoted its focus from traditional device encryption to cloud-based ransomware attacks. By exploiting native cloud features, these attackers bypass conventional malware defenses, exfiltrate sensitive data, destroy backups, and extort organizations—all without deploying traditional ransomware encryptors.

Nx npm Malware Explained: AI Agent Hijacking

Nx npm malware (Aug 2025): attackers published malicious Nx packages that weaponized AI coding agents (Claude Code, Gemini CLI, Amazon Q) via a postinstall script to inventory sensitive files and exfiltrate sensitive data to public GitHub repos named “s1ngularity-repository-*.” We break down what happened, affected versions, and how to check + respond (rotate credentials, hunt IoCs, and more). Resources.