Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Searching Certificate Transparency Logs (Part 2)

In the last post we discussed why we’re building our own Certificate Transparency (CT) search tool. There’s good background on the CT ecosystem in that post, so check it out if you haven’t. This post assumes a certain understanding of terminology covered previously. Now that we know where the CT logs live, and the different kinds of logs, we need to start reading them.

Introducing The GitGuardian IDE Extension for VS Code, Cursor, Antigravity, And Windsurf

Ship fewer secrets with your code. In this video we walk you through installing and using the GitGuardian IDE extension in Visual Studio Code, Cursor, Antigravity, Windsurf, and any VS Code compatible editor. You will see how the extension uses ggshield, the GitGuardian command line tool, to scan for 500+ types of secrets and catch plaintext credentials as soon as you save a file, long before they can be committed.

Sovereignty in the Age of Digital Interdependence: Rethinking Security for the Modern State

In a world defined by digitization and interconnectivity, the question of sovereignty extends far beyond physical borders. Nations today find themselves grappling with a new reality: how to assert control and protect critical assets when the backbone of their digital existence—cloud infrastructures, distributed systems, and global platforms—operates across jurisdictions, providers, and geopolitical lines.

Prompted to Fail: The Security Risks Lurking in DeepSeek-Generated Code

CrowdStrike research into AI coding assistants reveals a new, subtle vulnerability surface: When DeepSeek-R1 receives prompts the Chinese Communist Party (CCP) likely considers politically sensitive, the likelihood of it producing code with severe security flaws increases by up to 50%. Stefan Stein, manager of the CrowdStrike Counter Adversary Operations Data Science team, joined Adam and Cristian for a live recording at Fal.Con 2025 to discuss how this project got started, the methodology behind the team’s research, and the significance of their findings.

The Hidden Cost of Oversharing: How Your Social Posts Fuel Doxxing Campaigns

Many don’t question what they share online. Others think, what could possibly happen? The answer: “plenty.” We all leave traces. A birthday photo here, a check-in there, a proud post about a promotion. None of it seems dangerous on its own, but online, fragments add up. Each click, tag, or comment starts to paint a fuller picture: one more detailed than most of us know, or would like.

Attack Surface Discovery: A Quick Overview

Hybrid clouds, rapid development, and Shadow IT have expanded the modern attack surface, making complete visibility both crucial and more difficult than ever. Attack surface discovery offers a means of addressing these visibility gaps by continuously mapping all digital assets — internal, external, and hidden. This guide covers the fundamentals, best practices, and top tools for effectively discovering the attack surface.