Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

Ask the Experts: Black Friday Bot Attacks

As Black Friday approaches, retailers are gearing up for the inevitable surge in online traffic. But cybercriminals are also preparing for this high-stakes season, fine-tuning their bot attack strategies to exploit inventory, pricing, and customer accounts. To shed light on these threats and what retailers can do to prepare, we consulted five experts from Netacea who shared their insights on the bot attack landscape during Black Friday and beyond.

Redefining Modern Security with the Introduction of the Arctic Wolf Aurora Platform, Powered by Alpha AI

In today’s rapidly evolving threat landscape, where cyberattacks grow more sophisticated by the day, staying ahead requires more than vigilance—it demands a platform built to operate at scale. Enter the Arctic Wolf Aurora Platform, the new name for our industry-leading security operations platform. With the ability to process over seven trillion events weekly, The Aurora Platform stands as one of the largest and most advanced cybersecurity platforms in our industry.

Unveiling LIMINAL PANDA: A Closer Look at China's Cyber Threats to the Telecom Sector

On Tuesday, November 19, 2024, Adam Meyers, CrowdStrike Senior Vice President of Counter Adversary Operations, will testify in front of the U.S. Senate Judiciary Subcommittee on Privacy, Technology, and the Law on Chinese cyber threats to critical infrastructure. Within his testimony, Adam will speak publicly for the first time about a China-nexus state-sponsored actor that CrowdStrike Counter Adversary Operations tracks as LIMINAL PANDA.

7 Tips from a Security CTO for Balancing AI Innovation with Governance

As a modern CTO, it should probably come as no big surprise that I’m an optimist on the innovative prospects of artificial intelligence (AI). But I’ve been in this career for a long time, and that optimism is tempered with experience. I’ve seen enough emerging technology patterns to know that it always takes a lot more time and resources than people think to evolve innovative technologies beyond their final barriers.

How to Detect and Prevent Session Hijacking

Imagine leaving your car key at a public place, only to drop your keys when exiting the vehicle. Someone picks them up and drives away. They speed through a school zone and are caught on camera. Later, the car is used in a robbery. Now, you’re not only missing your car but also wrongly implicated in criminal activities.

AI Tokenization: Understanding Its Importance and Applications

In artificial intelligence (AI), especially within natural language processing (NLP), tokenization is a fundamental process that breaks down text into smaller, manageable units known as tokens. Depending on the specific task and model, these tokens can be individual words, subwords, characters, or even symbols.

The Rise of Network Observability: A Strategic Technology Enabler

The current era of distributed work requires delivery of truly borderless digital applications and services powered by the cloud, delivered via a secure network centered on high performance and best in class user experience. It is essential that your organization has visibility and real-time insights into the data flow across the extended enterprise network as well as the ability to apply the necessary People, Process & Technology safeguards for data in transit and rest.

Privacy and Safety Guide for Users of X: Addressing Stalking Concerns

The recent updates to the blocking feature on X (formerly Twitter) have sparked significant concerns about user safety and privacy, particularly regarding stalking. These changes now permit blocked users to view posts but prevent them from engaging, such as liking, commenting, or sharing.