Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CrowdStrike Strengthens Data Security Across Endpoint, Cloud, and SaaS Applications

CrowdStrike is expanding the capabilities of CrowdStrike Falcon Data Protection and introducing a new offering, SaaS Threat Services, enabling security teams to protect sensitive data across endpoints, cloud environments, and GenAI and SaaS applications. Today’s adversaries are targeting data wherever it resides. As GenAI adoption accelerates, misconfigured applications and unsecured usage create new vectors for data exposure.

A Look Into the Secrets of MCP: The New Secret Leak Source

MCP rapidly enhances AI capabilities but introduces security challenges through its distributed architecture. Especially, the distributed nature of MCP requires a lot of NHIs and their secrets. Our research shows that MCP is a new source of leaks that already discloses real-world secrets.

Enhancing Threat Intelligence and Threat Detection in Australian Central Government Organisations

In an era where digital frontiers are continuously expanding and evolving, adaptability is critical for Federal, State, and Local Government Departments, and Agencies to secure their infrastructure and sensitive data. Progress and growth strategies must be aligned with defense against growing cyber threats. Cyber threat intelligence (CTI) and threat detection have emerged as essential strategies for proactively identifying and mitigating cyber risks.

One Identity Fabric: Integrated solutions with responsible AI

Deploy a cloud-native solution at record time and low cost – One Identity CEO Mark Logan explores the benefits of One Identity Fabric to your environment. Join Mark Logan, CEO at One Identity, to delve into the use of best-in-class artificial intelligence (AI) within One Identity solutions.

Threat Context monthly, April 2025: EncryptHub & Media Land leak

Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news and threat information from KrakenLabs, Outpost24’s cyber threat intelligence team. Here’s what you need to know from April about EncryptHub, EncryptRAT, and the Media Land leak.

7 Core Principles of an Effective Application Security Program

If you’re building software, chances are your environment looks nothing like it did a few years ago. Monolithic applications have given way to microservices. On-prem systems have migrated to multi-cloud. Waterfall has become agile, and developers are pushing code daily (sometimes hourly). Security, meanwhile, is still catching up.

A New Chapter for API Security: Introducing the Salt MCP Server

There are rare moments when the technology world takes a massive leap forward. Today is one of those moments. At Salt Security, we have always believed that APIs form the connective tissue of the modern enterprise. As AI accelerates the pace of business beyond anything we’ve seen before, a simple truth has become clear: The way we discover, understand, and secure APIs must evolve, or we will be left behind.

ARMO vs. Wiz: Bridging the Gap in Cloud Runtime Security

The recent news about Google’s multi-billion-dollar acquisition of Wiz has sparked widespread conversation across the cybersecurity world. Its price tag reflects its strong reputation, Wiz is a leader in Cloud Security Posture Management (CSPM) solution. Its strength lies in identifying potential risks before they impact your live environment.

Introducing The Human Threat Map: A Tool for Mapping and Defending the Human Perimeter

The cyber security perimeter has evolved many times over the years, and we’re now at a point in time where it is shifted once again. We have reached an era where defence is no longer just about protecting our networks, endpoints, cloud systems or SaaS applications, but about protecting our people. Attackers now target employees directly, relying on their ability to exploit human behaviour to gain access, rather than technical vulnerabilities.