Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Caught in the Act: CrowdStrike's New ML-Powered LDAP Reconnaissance Detections

Early in the cyberattack kill chain, reconnaissance enables attackers to assemble critical network information to plan a tailored attack strategy. In this phase, adversaries aim to map out networks and their users, and locate system vulnerabilities, without setting off alarms. Proactive monitoring and early detection of this activity can disrupt attackers in their tracks and lower the risk of a breach.

Astra Security Raises Funding to Simplify Cybersecurity with AI-driven Pentesting!

Since 2018, Astra has been at the forefront of proactive cybersecurity. Trusted by over 800 global organizations in 70+ countries, we’ve conducted over 3,000 pentests and reported 2 million+ vulnerabilities. Combining automation with nearly half a century of collective human expertise makes Astra security more intuitive, accessible, and effective. Last year, our AI-powered pentest platform uncovered nearly 5,500 vulnerabilities per day.

The Truth Behind Successful Security Operations Centers (SOC) |Secrets of AppSec Champions

In this eye-opening episode, Reanna Schultz, an experienced Security Operations Center (SOC) team leader, pulls back the curtain on what makes a modern SOC truly effective. Drawing from her six-year journey through various cybersecurity roles, she reveals how SOCs serve as an organization's first line of defense against cyber threats.

From Firewalls to Digital Well-Being: A Whole-School Approach to Online Safety

Recently, I started working with my children's school to enhance their online safety measures and develop a digital mindfulness course in collaboration with their digital literacy lead. This experience highlighted the fact that our schools are not only expected to provide safe places of learning but also extend that safety into the digital spaces.

Organizations Observed 50% Increase in Deepfakes and Phishing Scams in 2024

Nearly half (46%) of businesses observed an increase in deepfakes and generative AI-related fraud last year, a new report from AuthenticID has found. Additionally, phishing attempts increased by 76% in 2024, and more than 90% of cyberthreats were driven by social engineering. The report also noted a rise in workplace-related fraud, including employee impersonation and account takeover.

Is Your Inbox a Cybersecurity Risk?

In today’s flexible and fast-paced digital environment, email still remains the backbone of communication for many organizations. Employee email accounts are chock-full of sensitive information from intellectual property to customer data, which makes securing email servers crucial. Data leakage and unauthorized access not only disrupt operations and cost time and money to fix, but they can also damage an organization’s reputation.

Bitsight TRACE Systematic Approach: CVE-2024-23897 as a Case Study

This article provides details on how Bitsight TRACE addressed CVE-2024-23897, an arbitrary file read vulnerability that affects Jenkins, a well-known open-source automation server. It includes technical details, common pitfalls, and decisions made since the CVE disclosure until now. The investigation of CVE-2024-23897 is an example of how we can obtain the target instance version but not solely rely on it to classify an instance as vulnerable. First, we go deep to understand the vulnerability.

Cyberhaven Winter 2025 Product Launch - February 4, 2025

Join us for the exclusive unveiling of Cyberhaven's next evolution, hosted by our leadership & product teams. We're (once again) changing the way companies visualize, detect, and protect their data. Be the first to see what's next. Imagine if You Could: Don't Miss the Reveal: Discover how Cyberhaven is setting the gold standard for the future of data security in the age of AI.

How Threat Intelligence is Transforming Pentesting & Red Teaming

Are You Testing for Compliance or Preparing for Real Attacks? Cybersecurity isn’t just about checking boxes—it’s about staying ahead of threats. Many businesses rely on Penetration Testing (Pentesting) and Red Teaming to identify vulnerabilities. However, these traditional methods often assume that attackers play by the same rules as defenders. Reality has other plans.

How to close digital supply chain security gaps without impeding workflows

Automatic Zero Trust protection. Bulk labeling of files. Easy-to-use tools. Here’s 3 ways to secure external collaboration without impeding workflows. Just as one broken link can disrupt a physical supply chain, it only takes one security gap to infect a digital supply chain. Digital supply chains are as vital to modern workflows as they are fallible to attack. From infected software to accidental third-party leaks, one single vendor can bring down the whole supply chain.