Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Do You Need More Than One PAM Solution?

When managing complex IT environments, many organizations wonder: Is one Privileged Access Management (PAM) solution enough? In this video, we break down why using multiple PAM tools can actually do more harm than good. From increased complexity and integration issues to higher costs and potential security gaps, we’ll explain why consolidating your PAM strategy is the smarter choice. Learn how a unified PAM platform like KeeperPAM helps simplify privileged access management while improving security and reducing overhead.

Proton66 Part 2: Compromised WordPress Pages and Malware Campaigns

Earlier this year SpiderLabs observed an increase in mass scanning, credential brute forcing, and exploitation attempts originating from Proton66 ASN targeting organizations worldwide that we are discussing in a two-part series. In the first part of this blog series, we investigated the malicious traffic associated with Proton66, revealing the extent of the mass scanning and exploit activities run by the SuperBlack ransomware-associated threat actors such as Mora_001.

Supercharge Your SOC Investigations with Splunk SOAR 6.4

Security operations teams face increasing threats, staffing shortages, and gaps in automation and orchestration. These challenges lead to alert fatigue, slower investigations, and increased risk. Enter Splunk SOAR 6.4, designed to streamline and enhance your security operations.

Rethinking the Human Factor in Cybersecurity

The phrase “humans are the weakest link in the security chain” is an oversimplification and lazy thinking. Why? Let’s break it down. Have you ever seen an advertisement for a product that promises to make life easier and thought, “I need that?” Choosing the simplest path to a desired outcome is not just human nature; it’s a principle of the entire animal kingdom. From an evolutionary standpoint, conserving energy for the greatest reward has always been advantageous.

[Scary] A New Real Cash Scam Sweeps Across the U.S. Warn Your Family and Friends!

Right now, today, thousands of people are being tricked into going to their banks or credit unions to withdraw large sums of cash and will give or send it to a complete stranger, never to see it again. Many of the victims are in the prime of their lives, intelligent, and consider themselves to be of above-average ability in spotting scams and scammers.

Hunting with Elastic Security: Detecting command and scripting interpreter execution

Stealthy adversaries continually exploit system utilities to execute malicious code. A particularly potent and frequently misused tactic is MITRE ATT&CK T1059 - Command and Scripting Interpreter, wherein attackers harness built-in interpreters like PowerShell, Bash, Python, or JavaScript to run arbitrary commands.

Lesson from Blue Shield CA's Google Analytics Breach Risk

On April 9, 2025, Blue Shield of California sent shockwaves through the healthcare industry with a data breach notification revealing that protected health information (PHI) may have been shared with Google Ads for nearly three years due to a misconfigured Google Analytics setup. This incident, affecting an undisclosed number of members, underscores the critical risks of noncompliance with HIPAA rules for online tracking technologies.

What Is a DMARC Record? A Simple Guide With Examples...

If you’ve ever wondered how companies can protect their emails from being hijacked or used for malicious purposes, the answer you’re looking for is DMARC (Domain-based Message Authentication, Reporting, and Conformance). A DMARC record is an auxiliary security configuration that can be a difference-maker in the battle between legitimate senders and threat actors. It serves as a reliable mechanism to deal with rogue emails and stave off spoofing and other email-based threats.

How LivePerson automates vulnerability management to reduce risk

For modern security teams, managing vulnerabilities efficiently is critical to reducing risk and maintaining a strong security posture. However, the sheer volume of vulnerabilities, complex IT environments, and resource constraints make traditional approaches unsustainable. Automating key aspects of vulnerability management not only speeds up remediation, but also ensures consistency and accuracy across the entire vulnerability lifecycle.