Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Announcing Opengrep: Continuing the Open-Source Mission for Static Code Analysis

At Jit, we are proud to announce our participation in a consortium of companies that have come together to launch Opengrep, a continuation of Semgrep’s groundbreaking OSS. Opengrep is born out of our shared commitment to keeping static code analysis open, accessible, and community-driven.

5 AI Scams You Need To Be Aware Of In 2025

AI is revolutionizing our lives in terms of productivity, automation, customer service, and more. AI is becoming so important that organizations increased spending on compute and storage hardware infrastructure for AI deployments by 37% year-over-year in the first half of 2024, reaching $31.8 billion. However, like most technological advances, the good often comes with the bad.

The 8 Types of Penetration Testing: When You Need Them and How Often to Test

Penetration testing (aka pentesting or ethical hacking) might sound intense—and honestly, it is—but think of it as your digital stress test. Ethical hackers mimic real cyberattacks on your systems to find weak spots before the bad guys do. The coolest part? Pen tests come in different flavors, each targeting specific risks. So, how do you know when it’s time for a pentest? How often should you schedule them? And which one is right for your business?

Why Cyber Insurance Is Vital To Keeping Businesses Standing When Threats Hit

Steve Hunter, Director of Sales Engineering at Arctic Wolf, discusses the importance of cyber insurance for organizations in mitigating cyber risks. He explains the types of coverage cyber insurance policies offer, the growing challenges in obtaining coverage, and the essential strategies for evaluating a policy. Steve also highlights the need for organizations to enhance their cybersecurity measures and how they can communicate effectively with insurers to improve their risk profile.

Cyber Risk Heats Up: 2025 Predictions for Australia

Mark Thomas, Director of Security Services for ANZ at Arctic Wolf, unravels the upcoming cyber security landscape in 2025. He outlines heightened risks due to geopolitical tensions and zero-day cyber attacks, the need for better protection of critical infrastructure, the impact of technology investment, and the importance of viewing cyber risk as business risk.

Lumma Stealer: Fake CAPTCHAs & New Techniques to Evade Detection

In January, Netskope Threat Labs observed a new malware campaign using fake CAPTCHAs to deliver Lumma Stealer. Lumma is a malware that works in the malware-as-a-service (MaaS) model and has existed since at least 2022. The campaign is global, with Netskope Threat Labs tracking victims targeted in Argentina, Colombia, the United States, the Philippines, and other countries around the world.

The Evolution of SSE and Its Role in Modern Security Architectures

The cybersecurity landscape has shifted dramatically over the last several years. More and more work takes place outside of the office and in the cloud — in fact, experts expect the cloud market to exceed $676 billion in 2024. It’s not hard to see why. With the cloud, organizations gain unprecedented freedom to work how they want, whether that’s in-office, in one or more cloud environments, or in a hybrid of multiple approaches.

Trust Center: A Comprehensive Guide for Organizations

Most enterprise security teams spend hundreds of hours annually filling security questionnaires and sharing compliance documents with customers. A trust center cuts this down to near zero by putting everything in one place. The concept isn’t new – organizations have long maintained security documentation. However, recent data breaches, stricter regulations, and cloud adoption have transformed an essential requirement into a business driver.