Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

KAWA4096's Ransomware Tide: Rising Threat With Borrowed Styles

KAWA4096, a ransomware whose name includes "Kawa", the Japanese word for "river", first emerged in June 2025. This new threat features a leak site that follows the style of the Akira ransomware group, and a ransom note format similar to Qilin’s, likely an attempt to further enrich their visibility and credibility. In this blog post, we’ll share key insights from an analyzed KAWA4096 sample to uncover how this ransomware operates and what sets it apart.

Demo: Tanium integration with Microsoft Sentinel

Discover how Tanium’s powerful integration with Microsoft Sentinel transforms your security operations. In this demo, we walk through real-world scenarios showing how your team can streamline investigations, accelerate response times, and centralize threat intelligence—all within the Sentinel console. What You’ll Learn: Key Benefits.

Can Your Hospital Keep Running During a Cyberattack?

A cyber breach shouldn't bring critical patient care to a halt. That’s the idea behind the Minimum Viable Hospital, a model that ensures essential functions continue even under attack. Errol Weiss shares how leading healthcare systems are planning for resilience, and why smaller hospitals may struggle to keep up. He highlights how the standard response to healthcare cyberattacks overlooks the complex reality of delivering medical care. It’s time to recognize that cybersecurity isn’t just about systems, it’s about people.

Unlock Email Threat Visibility with Mimecast and Graylog

Email threats aren’t slowing down. From credential phishing to malware-laced attachments, email remains one of the most exploited entry points for attackers. If you’re already using Mimecast to help mitigate that risk, you’re ahead of the curve — but raw log data only gets you so far. Starting with Graylog 6.2.3, you can pull logs directly from Mimecast using API v2.0 and view them immediately with built-in Illuminate Dashboards.

Trustwave Executive Business Reviews Turn Security Updates into Board Level Conversations

Trustwave is making Executive Business Reviews (EBR) available to its client base. EBRs are a methodology designed to deepen Trustwave's already strong client relationships by helping clients stay informed as to their current security status, regional and sector-related threats, security costs and optimization opportunities.

How to Enable Manager Level Reporting for Managed Security Awareness

This video will demonstrate how manager level reporting can be enabled for Managed Security Awareness customers. With this visibility, managers can follow up with employees, ensure the content is consumed and ultimately help the organization build a culture of security.

How to Block/Allow Unmanaged Devices from Accessing SaaS Applications?

Are your employees accessing apps like Google Workspace, Microsoft 365, or Salesforce from personal devices? This poses a major security risk to your business! In this video, we’ll show you how miniOrange CASB (Cloud Access Security Broker) helps you block unauthorized devices, enforce device-based access control, and secure your SaaS environment — all in real-time.

How Fidelis Integrates Detection and Response for SQL-Based Exploits

SQL injection attacks remain one of the most dangerous and frequently exploited web vulnerabilities—even in today’s age of secure coding and DevSecOps. Despite widespread awareness, attackers continue to target database-driven applications using clever payloads that evade surface-level defenses. The challenge isn’t just that SQL injections still work—it’s that many organizations don’t detect them until it’s too late.

So you're buying your first SIEM... here's how not to suck at it

Welcome to the chaos. You’ve been told you need a SIEM. Maybe it was your CISO. Maybe it was your auditor. Maybe your SOC is tired of stitching together logs with duct tape and Python scripts. Doesn’t matter — you’re now on the SIEM buying journey. Congratulations… and condolences. Let’s walk through how to actually buy your first SIEM without lighting your budget (and your team’s morale) on fire.

Enhance your cloud security visibility with the updated AWS CloudTrail app

For organizations operating in the cloud, visibility is everything. You need a reliable source of truth to answer “who did what, when, and where,” whether you’re investigating a security incident, chasing compliance goals, or monitoring operational activity. Enter the Sumo Logic CloudTrail App, your go-to solution for transforming raw AWS CloudTrail logs into meaningful, actionable insights.