Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Closing the Gap: How to Build a Consistent Exposure and Vulnerability Management Workflow

Security teams are faced with an ongoing challenge when it comes to exposure and vulnerability management. It’s not the actual discovery of the vulnerability that poses the challenge, but what to do once you discover one. Without a structured process, IT and security teams struggle to address vulnerabilities efficiently, and are in a constantly reactive mode, and struggle to address vulnerabilities efficiently, increasing potential risks.

NetSupport RAT Malware: VM Evasion & Self-Deletion Tactics

Researchers at Foresiet have analyzed a Remote Access Trojan (RAT) known as NetSupport Manager. Originally developed as a legitimate remote access and IT support tool, NetSupport Manager has a history spanning over two decades. It provides features such as file transfer, remote desktop sharing, chat support, screen monitoring, and inventory tracking. However, in recent years, threat actors have increasingly weaponized this tool in malicious campaigns.

Can End-to-End Encryption Be Hacked?

We have become so reliant on communicating on the Internet that sometimes we need to take a minute to consider how our data is being protected and whether what we send on the Internet is truly safe. While end-to-end encryption has become integral to protecting our data online, you may be thinking, can end-to-end encryption be hacked?

How Corelight's anomaly detection enhances network security

Signature-based detections provide fast, effective defense against known attacks. But the threat landscape is rapidly changing: Attackers are utilizing novel, sophisticated techniques that can bypass traditional, signature-based detection methods and also weaponizing legitimate tools and processes to avoid established detection tools, including endpoint detection. In this dynamic environment, organizations must in turn deploy new detection techniques to keep pace.

Enhanced Cloudflare Access: private hostnames, IP apps, and reusable policies

Welcome to Cloudflare Security Week 2025! During this year's Security Week, we are boosting security with AI-driven insights, better threat detection, and stronger protections against emerging risks. Our aim is to empower customers with more intuitive and user-friendly solutions to protect their data and applications in an increasingly complex environment. In this episode, tune in for a conversation with Cloudflare's Kenny Johnson, Principal Product Manager.

Managing sensitive data exposure in AWS and GCP using Cloudflare

Welcome to Cloudflare Security Week 2025! During this year's Security Week, we are boosting security with AI-driven insights, better threat detection, and stronger protections against emerging risks. Our aim is to empower customers with more intuitive and user-friendly solutions to protect their data and applications in an increasingly complex environment. In this episode, tune in for a conversation with Cloudflare's Alex Dunbrack, Senior Product Manager, and Noelle Kagan, Senior Manager, Product Management.

Introducing a new Application Security experience

Welcome to Cloudflare Security Week 2025! During this year's Security Week, we are boosting security with AI-driven insights, better threat detection, and stronger protections against emerging risks. Our aim is to empower customers with more intuitive and user-friendly solutions to protect their data and applications in an increasingly complex environment. In this episode, tune in for a conversation with Cloudflare's Jessica Tarasoff, Product Design Lead, and Pete Thomas, Senior Manager, Product Design.

Ofgem's Mollie Chard on driving resilience through diverse hiring practices

In this week’s episode of The Future of Security Operations podcast, Thomas is joined by Mollie Chard. Mollie’s career spans 10+ years in technical SOC and leadership roles at organizations like the UK’s Met Office, Capgemini, and OVO. She’s recently accepted a new role as Head of Cyber Guidance & Monitoring at Ofgem, the UK’s Office of Gas and Electricity Markets. A passionate advocate for diversity, she’s also the Chief Advisor for Women in Cybersecurity UK and Ireland.