Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Enabling Safe AI Adoption: Insights from Nightfall AI and Vanta

How should data security teams walk the fine line between enabling AI innovation, safeguarding sensitive data, and ensuring compliance? That question drives everything we build at Nightfall. It’s also an excellent jumping off point for an in-depth discussion among security experts.

SBOM 2.0: Runtime Visibility, License Intelligence, Unmatched Container Security.

We’re excited to announce a major enhancement to the ARMO platform: Full Software Bill of Materials (SBOM) with Runtime Visibility and Open Source License Insights. In today’s threat landscape, it’s not enough to know what went into your containerized applications. You need to know what’s actually running, how it’s behaving, and whether it introduces compliance or legal risks. ARMO’s new SBOM capability delivers just that.

A practitioner's guide to classifying every asset in your attack surface

“You can’t secure what you don’t know exists.” It’s a common refrain in cybersecurity (and for good reason!). But the reality is a bit more complex: it’s not enough to just know that something exists. To effectively secure your assets, you need to understand what each of them is. Without proper classification, applying the right security processes or tools becomes a guessing game.

Actions to Take Following the M&S Cyber Attack

In light of the recent disclosure by Marks & Spencer (M&S) regarding a cyber attack that resulted in the theft of customer data, we strongly recommend that if you are affected you take immediate and proactive steps to protect your digital identity and reduce the risk of further compromise.

CVE-2025-32756: Exploitation of Critical Severity Zero-Day Vulnerability in Fortinet FortiVoice

On May 13, 2025, Fortinet published a security advisory on a critical severity stack-based overflow vulnerability, CVE-2025-32756, impacting FortiVoice, FortiCamera, FortiMail, FortiNDR, and FortiRecorder. The vulnerability allows remote unauthenticated threat actors to execute arbitrary code or commands via crafted HTTP requests. In the advisory Fortinet stated that the vulnerability has been exploited in the wild on FortiVoice.

One Click Is All It Takes: The Danger of CSRF Attacks

CSRF attack or Cross-site request forgery is a very dangerous and stealthy web security vulnerability that exploits trust from a user's browser for a web application. A successful CSRF attack deceives an authenticated user into performing some operations without his consent-like account modification or payment or financial transaction against his will. Most alarming in such cases is that CSRF attacks usually remain unknown for end-users that make defending against them difficult.

Internal Cybersecurity Risks in Organizations

When most people think of cybersecurity threats, they picture outside attackers trying to breach the network. But often, the biggest risks are already inside. Whether it’s human error, shadow IT, or poor policy enforcement, internal vulnerabilities can be just as damaging. In this blog, we’ll explore five commonly overlooked cybersecurity risks within organizations and how you can proactively address them.

SOAR & DSDL: Crossover for Agentic AI Workflow

Recently we released the Splunk App for Data Science and Deep Learning (DSDL) v5.2.0. This update introduced new features for integrating large language models (LLMs) and retrieval-augmented generation (RAG). With DSDL v5.2.0, users can easily perform LLM prompts, vector searches, RAG, and function calling directly from the app's dashboards.

The Benefits of Shifting Left: Minimize Risk and Save Money with Early Security Integration

Shifting left in security, or integrating security early in the software development lifecycle (SDLC), can help your organization save time and money. By identifying and addressing potential security flaws early, organizations can reduce the likelihood of vulnerabilities being exploited in production applications. This proactive approach is more cost-effective and time-efficient, as it prevents the accumulation of technical debt and minimizes the need for extensive rework or redesign.