Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Falcon Identity Protection Real-Time Entra ID Login Protection

Watch to see how CrowdStrike Falcon Identity Protection stops the compromise of Entra ID accounts by enabling you to leverage the Falcon platform’s context within the authentication flow through risk-based conditional access. Stop identity-based attacks in real time with the industry’s only unified platform for endpoint security and identity protection.

Detect and respond to evolving attacks with Attacker Clustering

In today’s threat landscape, detecting and responding to distributed attacks is more challenging than ever. Attackers often operate in stealth, using coordinated strategies to blend into normal traffic and evade detection. To address this issue, Datadog Application Security Management (ASM) has a new clustering feature designed to identify and group attacker behaviors during distributed attacks.

AI-Automated Fuzzing Found a Heap Buffer Overflow in AWS C Common Library

A critical heap buffer overflow vulnerability in the AWS C Common library was discovered autonomously through an AI-automated fuzz testing solution, CI Fuzz, and has been fully addressed with a patch. In this post, we explore the vulnerability and its potential impact on embedded systems.

WatchGuard Labs Detects 300% Surge in Endpoint Malware in Q3 2024

While malware growth is something we have been experiencing over the past few years, the increase observed by WatchGuard's threat lab team in Q3 2024 was the highest to date. Q3 saw astronomical growth in total endpoint malware threats, reaching 300.48% with 420,304 threats. The previous high was recorded in Q1 2024, when there was an 81.77% rise, almost double the previous quarter. However, Q3 almost quadrupled the figure for Q2 2024 when 104,951 threats were detected.

Security through obscurity: An illusion of safety?

Security through obscurity is based on the idea that if attackers don’t know how a system works or even if it exists, they’ll have a harder time breaching it. Despite repeatedly broken implementations and lacking support from standards bodies, this concept continues to be widely used. Secret doesn’t always mean safe – and it can even give a false sense of security.

Keep AI interactions secure and risk-free with Guardrails in AI Gateway

The transition of AI from experimental to production is not without its challenges. Developers face the challenge of balancing rapid innovation with the need to protect users and meet strict regulatory requirements. To address this, we are introducing Guardrails in AI Gateway, designed to help you deploy AI safely and confidently.

The Hidden Cost of Hospital Cyber Attacks: What Happens to Patients? #Healthcare #DataSecurity

What happens to patients when their local hospital has a ransomware attack? How do you even find that? You collect data on every cyberattack on a healthcare provider. Next, you look at data from Medicare and then overlay those two data sets. Simple. Listen to the latest episode of the @Data Security Decoded podcast, where @Steve Stone is joined by @Hannah Neprash, PhD, Assistant Professor at the University of Minnesota School of Public Health.

Using Threat Intelligence to Support Regulatory Compliance

As cyber threats evolve in scale and sophistication, governments and regulatory bodies are tightening cybersecurity and data protection regulations. Compliance is not only about avoiding fines but also about building trust, enhancing operational resilience, and safeguarding long-term business success. Data breaches and cyberattacks can disrupt operations and as such, organisations should prioritise compliance to mitigate financial and legal risks whilst fostering customer confidence.