Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI Use Cases for the SOC: How Generative AI Transforms Security Operations

Today’s security operations centers (SOCs) are under more pressure than ever. The number of alerts is growing. Threats are more complex. And security teams are expected to detect, investigate, and respond to incidents faster, all while grappling with talent shortages and limited resources. Generative AI is emerging as a critical enabler in this environment.

Inside Today's Cyber Attacks: What We Can Learn from Ransomware Groups Like Scattered Spider

Cyber attackers like Scattered Spider are bypassing firewalls—using stolen credentials and social engineering to walk right in! Learn how these new threats exploit trust, target your help desk, and turn your processes against you. Discover why identity is now the new perimeter and what IT leaders must do to protect their organisations.

Codify to Fortify: The Strategic Advantage of Detection as Code

As a security executive, how do you know if your organization can detect a certain attack? A talented, experienced team armed with advanced tooling can certainly generate confidence — but even then, detections can slip through the cracks if not properly codified.

Are You Protecting the Right People in Your Organization?

If your security priorities still center on CVSS scores and device vulnerabilities, you’re missing a significant piece of the risk puzzle. People. Attackers aren’t following your org chart. They’re targeting whoever gives them access. Enter the concept of Very Attacked People (VAPs): individuals in your environment who attract the most persistent, targeted attacks. And they’re not always the CEO or the CISO.

Introducing Splunk 10: Empowering a Secure and Compliant Future

Splunk is pleased to announce the general availability of Splunk Enterprise 10.0 and Splunk Cloud Platform 10.0, the most secure, stable, and modernized platform for a digitally resilient, compliance-ready future. The Splunk 10 platform is the next evolution of data security. With the latest cryptographic models and more performant data pipeline management, Splunk 10 delivers continued momentum in search & indexing, dashboard visualization, and ease of compliance administration.

Cisco Network Visibility Module Analytics (NVM)

Cisco Network Visibility Module Analytics (NVM): A new analytic story leveraging Cisco NVM telemetry to detect suspicious endpoint network behavior. This release includes 14 new analytics and mapped existing detections covering threats such as insecure curl usage, typosquatted Python packages, abuse of native Windows tools like rundll32 and mshta, and anomalous network connections from uncommon or argument-less processes.

Beyond the Patch: SharePoint Exploits and the Hidden Threat of IIS Module Persistence

The cybersecurity landscape witnessed a perfect storm in July 2025 when multiple critical SharePoint vulnerabilities collided with sophisticated IIS module-based persistence techniques, creating a nightmare scenario for enterprise defenders. CVE-2025-53770, CVE-2025-53771, CVE-2025-49704, and CVE-2025-49706 are being actively exploited by sophisticated threat actors, but the real danger extends far beyond the initial exploitation phase.

How Netskope's Log Streaming Supercharges Your SOC

In today’s cloud-first world, security teams need real-time, actionable visibility into user activity and threats across the web, cloud, and private apps. The newly announced Netskope Log Streaming delivers just that. Netskope’s Log Streaming solution delivers significant value by providing real-time access to all Netskope-generated security logs directly into customers’ preferred cloud storage and last mile security information and event management (SIEM) tools.

CitrixBleed 2: When Memory Leaks Become Session Hijacks

The cybersecurity community is facing yet another critical infrastructure vulnerability that threatens enterprise networks worldwide. CVE-2025-5777, dubbed "CitrixBleed 2" by security researcher Kevin Beaumont, represents a dangerous out-of-bounds memory read vulnerability in Citrix NetScaler ADC and Gateway devices. This new flaw bears an unsettling resemblance to the original CitrixBleed (CVE-2023-4966), which was widely exploited by ransomware groups and nation-state actors in 2023.

Improving Security with Blue Team Exercises

In many sports, but especially soccer, a team has a set of offensive players and defensive players. The offensive players look for ways to compromise the opposing team’s defenses, seeking to get the ball in the goal. Meanwhile, the defenders work hard to push back against the opponent’s offensive line to clear the ball from the goal line. On a security team, your defenders are the blue team.