Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Demo Tuesday | Change Management

Network changes are hard, but cleaning up unused routing policy config from devices? That's PUNISHING. If you find yourself frozen in fear, not knowing what the downstream effect is of removing that config, then tune in for the Season 2 opener of Demo Tuesday, where Mike will do the unthinkable — cleanup old routing policy configuration. See how Forward Enterprise can eliminate your fear!

Elastic Security simplifies customization of prebuilt SIEM detection rules

Customizing and updating prebuilt SIEM detection rules just got easier, improving precision, enabling broader coverage, and saving time. Customizing and updating prebuilt detection rules is now easier than ever with Elastic Security. We’ve streamlined detection engineering workflows and enabled greater use case coverage with out-of-the-box SIEM detection rules.

BDRSuite v7.6.0 is Generally Available Now!

We are excited to announce that BDRSuite v7.6.0 is now generally available! This latest release brings major updates across backup and recovery processes, platform support, and security enhancements. With new features such as restore authentication, expanded Linux remote proxy support, and flexible fail-back options for Hyper-V, BDRSuite enhances backup and restore capabilities while strengthening security through advanced measures. Download BDRSuite v7.6.0 Start Your 30-day Free Trial.

Essential Components of a Cloud Runtime Protection Strategy

Securing cloud environments at runtime is no easy feat. Unlike traditional infrastructure, cloud workloads are dynamic, ephemeral, and often span multiple platforms — making continuous visibility a moving target. Adversaries continue to set their sights on cloud: According to the CrowdStrike 2025 Global Threat Report, new and unattributed cloud intrusions were up 26% year-over-year in 2024, indicating more threat actors seek to exploit cloud services.

Malicious PyPI Package Hijacks MEXC Orders, Steals Crypto Tokens

The JFrog Security Research team regularly monitors open source software repositories using advanced automated tools, in order to detect malicious packages. In cases of potential supply chain security threats, our research team reports any malicious packages that were discovered to the repository’s maintainers in order to have them removed. This blog provides an analysis of the ccxt-mexc-futures malicious package which aims to leak crypto currency trading credentials.

Moving Beyond IT: The Strategic Value of Threat Intelligence for Businesses

In today’s digital-first world, cyber threats are not only increasing in volume, but they’re also becoming more targeted, coordinated, and expensive. According to IBM’s Cost of a Data Breach Report 2024, the global average data breach cost has reached USD 4.88 million, a 10% increase over last year and the highest total recorded to date.

Best Practices for Transitioning from Security to Privacy

As global privacy requirements evolve, many information security professionals are called upon to enhance or lead information privacy programs. While this transition may seem like a natural progression, I learned five important lessons when I moved from a focus on security and audit to the field of information privacy.