Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

From Reactive to Resilient: A New Mindset for Supply Chain Cybersecurity

Supply chain security is no longer just an IT issue, it’s a critical business concern. As recent high-profile breaches like the MOVEit vulnerability have shown, a single vulnerability in a vendor’s system can have a cascading effect, disrupting operations and damaging reputations across the entire supply chain. This shift in the threat landscape demands a new approach to cybersecurity that prioritizes collaboration, resilience, and a proactive defense strategy.

Cato CTRL Threat Research: Stuck in the Past- How Hackers Exploit Years-Old CVEs for Cryptojacking

Cybercriminals often exploit outdated vulnerabilities – quite literally. While organizations focus on addressing the latest zero-day threats, attackers continue to profit by targeting weaknesses that should have been resolved long ago. Some of these Common Vulnerability and Exposures (CVEs) date back nearly a decade, yet they remain heavily exploited. This trend proves that old flaws never truly disappear.

Public Sector Cyber Security Challenges

Public sector enterprises are prime targets for cyber threats due to the critical nature of the services they provide, the sensitive data they store, and the regulatory landscape they must navigate. Unlike private sector organizations, government entities face unique challenges that require tailored cybersecurity strategies. Below are some of the most significant cybersecurity obstacles encountered by public sector enterprises.

The Russia-Ukraine Cyber War Part 3: Attacks on Telecom and Critical Infrastructure

This post is the third part of our blog series that tackles the Russia-Ukraine war in the digital realm. In this installment, we take a look at how both countries disrupted operations and services in the telecommunications, critical infrastructure, and technology sectors.

The Log360 security platform: Thinking outside the logs

We’re excited to announce the evolution of our SIEM solution, Log360, into a unified security platform. ManageEngine Log360 has adopted an open API-compatible architecture, allowing for expanded capabilities, seamless integration, and the ability to customize both data reporting and the underlying framework. This upgrade empowers you to extend the solution beyond its predefined functionalities, helping you unify and streamline security operations.

NIST AI RMF 1.0 vs SP 800-171 r2 vs SP 800-53 r5: The Overlaps, Differences, and Applicability

As cybersecurity threats evolve and regulatory requirements tighten, organizations worldwide are turning to NIST (National Institute of Standards and Technology) frameworks to strengthen their security and risk management strategies.

How AppTrana WAAP Helps Achieve FedRAMP Compliance

As organizations move to the cloud, achieving FedRAMP compliance becomes a critical requirement for security and risk management. The framework mandates rigorous security controls across risk assessment, incident response, system integrity, audit logging, and continuous monitoring. AppTrana WAAP (Web Application and API Protection) helps organizations address these controls by offering comprehensive security measures, including vulnerability scanning, continuous monitoring, and attack prevention.

How To Protect Privileged Accounts From Insider Threats

While many organizations focus on mitigating external cyber threats, insider threats can target privileged accounts with elevated access to sensitive data or systems. Based on Cybersecurity Insiders’ Insider Threat Report, 83% of organizations suffered at least one insider attack in 2024.

Legal and Compliance Benefits to Maintaining a Network Digital Twin

In today’s digital landscape, network failures and data breaches are not just technical headaches or concerns for CISOs only, they can trigger major legal consequences. Regulatory agencies are sharpening their focus on cybersecurity, and class-action lawsuits, hefty fines, and reputational damage are real risks. For legal teams and boards, ensuring compliance, conducting robust due diligence, and being ready for litigation is not optional; it is a must.

Detecting and Controlling Hidden DNS Tunnel Attacks

DNS is the backbone of the internet, translating domain names into IP addresses to facilitate communication between devices. However, cybercriminals exploit DNS to create covert channels for data exfiltration and command-and-control (C2) operations using DNS tunneling. This technique allows attackers to bypass security measures by disguising malicious traffic as legitimate DNS queries. As DNS-based attacks continue to rise, securing DNS traffic has become a priority for organizations worldwide.