Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Malicious Memes: How Cybercriminals Use Humor to Spread Malware

Internet memes and viral content have become a universal language of online culture. They're easily shareable, often humorous, and can spread rapidly across various platforms. However, this same virality and cultural resonance make memes an attractive vector for cybercriminals and threat actors. Anatomy of a meme Memes are nothing new, and have been around for decades. In fact, a comic published in 1921 followed one of today's most common meme themes: ‘Expectation vs.

Achieving Continuous Exposure Management in Cloud-Native Environments

In this webinar, "Achieving Continuous Exposure Management in Cloud-Native Environments," Tally Netzer and Aaron Unterberger from Nucleus dive deep into how modern cloud architectures impact vulnerability and exposure management. You'll learn: Why traditional vulnerability management falls short in cloud-native, ephemeral environments. How fragmented visibility and unclear ownership disrupt effective security practices.

Supporting CTEM Scoping with Exposure Assessment Platforms

In our recent article on Continuous Threat Exposure Management (CTEM), we highlighted how exposure assessment platforms (EAPs) like Nucleus can support several critical phases of the CTEM framework. In that article, we intentionally separated the scoping step from the other technology-dependent CTEM stages. Scoping begins as a business- and process-driven exercise. However, doing scoping well and at scale relies more on having the right technology.

Put AI to work where workflows work best

In this guest post, Jason English, Director and Principal Analyst at Intellyx explores how GenAI is moving beyond chat to orchestrate real action for SOC teams. As my colleague Eric Newcomer mentioned in the previous chapter of this series, GenAI changes the security automation game, with multi-system discovery, documentation, and task execution capabilities that can reduce cognitive load and toil for security analysts.

HellCat Ransomware: What You Need To Know

HellCat is the name of a relatively new ransomware-as-a-service (RaaS) group that first came to prominence in the second half of 2024. Like many other ransomware operations, HellCat breaks into organisations, steals sensitive files, and encrypts computer systems - demanding a ransom payment for a decryption key and to prevent the leaking of stolen files.

AI in XDR: A Step Towards More Advanced Cybersecurity

In recent years, cybersecurity has undergone a radical transformation. Traditional solutions, once sufficient to protect organizations' digital assets, have become obsolete against increasingly complex cyber threats. Malicious actors now leverage advanced technologies to launch sophisticated attacks at unprecedented scales and speeds. According to the UK's National Cyber Security Centre, AI is accelerating the spread of ransomware and lowering the entry barrier for less experienced cybercriminals.

How Does Managed Detection and Response (MDR) Services Strengthen Security Posture

Managed Detection and Response is crucial in strengthening securing systems from cyber-attacks. MDR integrates latest technology that detects threats providing around-the-clock monitoring and speedy response to problems. To detect and eliminate advanced threats such as advanced persistent threats (APTs) and zero-day vulnerabilities, it resorts to a mix of automated tools and human intervention. These threats pose serious risk to organizations and their compliance to security requirements.

API Attacks Up 150% - Here's Why You Should Care Now #APISecurity #APIAttacks #AIVulnerabilities

Even worse, 98.9% of AI vulnerabilities are tied to insecure APIs.. APIs are being discovered in under 30 seconds, according to Wallarm’s honeypot research. Weak authentication, broken access controls, and missing rate limits are opening the door. Now’s the time to take API security seriously. Learn how to protect your systems before it’s too late.

Unmasking EncryptHub: Help from ChatGPT & OPSEC blunders

This is the second part of Outpost24’s KrakenLabs investigation into EncryptHub, an up-and-coming cybercriminal who has been gaining popularity in recent months and is heavily expanding and evolving operations at the time of writing. We’ve already published one article explaining EncryptHub’s campaigns and TPPs, infrastructure, infection methods, and targets.