Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Learn About Open Source Security Risks With the New Snyk Learn Learning Path

Snyk Learn, our developer security education platform, now includes lessons on risks in open source software! Check out the new learning path that covers the OWASP Top 10 risks for open source software. Open source software forms the backbone of today’s digital infrastructure. From libraries and frameworks to entire platforms, open source is everywhere. But as a famous uncle once said, with great power comes great responsibility!

Dynamic Application Security Testing: DAST Basics

DAST is a security tool that attempts to penetrate an application from the outside by checking its exposed interfaces for vulnerabilities and flaws. Sometimes called a web application vulnerability scanner, it is a type of black-box security test. It looks for security vulnerabilities by simulating external attacks on an application while the application is running.

Uptick in Ransomware Threat Activity Targeting Retailers in the UK

Between April and May 2025, several large UK retailers were impacted by security incidents which resulted in the disruption of their operations. Arctic Wolf is monitoring the threat landscape for new indicators of compromise related to Scattered Spider and DragonForce, and will alert Managed Detection and Response customers if any malicious activity is observed.

Arctic Wolf Observes Exploitation of Path Traversal Vulnerability in Samsung MagicINFO 9 Server (CVE-2024-7399)

As of early May 2025, Arctic Wolf has observed exploitation in the wild of CVE-2024-7399 in Samsung MagicINFO 9 Server—a content management system (CMS) used to manage and remotely control digital signage displays. The vulnerability allows for arbitrary file writing by unauthenticated users, and may ultimately lead to remote code execution when the vulnerability is used to write specially crafted JavaServer Pages (JSP) files.

SMB Security Survey Reveals High Awareness, Lagging Protection

In today’s digital-first world, cybersecurity isn’t just an IT issue — it’s a business imperative. And while small businesses may run lean, they carry the same responsibility as large enterprises when it comes to securing data, operations, and reputation. Adversaries don’t always target by size. They target opportunity wherever it exists. In many SMBs, that opportunity to attack stems from under-resourced teams, outdated tools, and a false sense of security.

CrowdStrike Falcon Cloud Security Extends Unified Protection to VMware Environments

Organizations are rapidly adopting cloud platforms to accelerate development, scale operations, and optimize efficiency. VMware’s robust cloud solutions, including VMware Tanzu Platform and VMware vCenter, are among the critical tools that empower teams to build, deploy, and manage workloads with ease. However, this evolution brings new security challenges. Virtual machines, container images, and other cloud assets can become attack vectors if not properly protected.

Practical Tips to Reduce AWS EC2 Backup and Storage Costs

Backing up data stored in AWS, such as EC2 instances, is essential to mitigate the risks of data loss events that can occur even in cloud environments. AWS cost optimization is a set of measures to save costs paid for AWS services related to data backup. These measures include preventing unnecessary data storage, optimizing storage and other practices. This blog post explains the nature of AWS pricing when backing up data.

SWIFT Customer Security Programme: What You Need to Know to Stay Compliant?

The SWIFT Customer Security Programme (CSP) is a security framework developed by SWIFT to improve the cyber security posture of financial institutions connected to its network. It aims to fight against growing cyber threats by providing a structured set of 32 SWIFT security controls that institutions must implement to safeguard their SWIFT related infrastructure. These controls are grouped under three key objectives: Secure Your Environment, Know and Limit Access, and Detect and Respond.

Imposters at the Gate: Spotting Remote Employment Fraud Before It Crosses the Wire

Have you ever sat in an interview and felt that something wasn't quite right? Your intuition may have been closer to the truth than you realized. A new kind of adversary has emerged, and they aren’t trying to break through your firewall; instead, they are logging in through your VPN using their freshly issued business credentials.

Strengthening Cybersecurity Incident Response Part 2: From Detection to Recovery

Cyber incidents are always going to be present. Regardless of whether you’re working for a startup or a corporation, malicious software can target you and your business. This is why it’s important to work closely with cybersecurity incident response teams and have such protocols in place. The lifecycle of a cybersecurity incident starts way before it happens with good preparation. However, the right actions should be taken if such a problem unfolds.