Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why GenAI Should Be a Deciding Factor With Email Security Investments

The good news is that advanced email protection methods do not necessarily call for a trade-off. Generative AI (GenAI) is both a way to embrace innovation and an enabler of robust defense mechanisms to take action against dangers that are increasingly difficult to counter. Investing in this technology at any stage of your email security program can make your organization adaptive, future-focused, and fully prepared to mitigate the risks posed by cybercriminals leveraging AI tools for malicious purposes.

CVE-2024-55591: Follow up: Authentication Bypass Vulnerability in Fortinet FortiOS and FortiProxy

On January 14, 2025, Fortinet published a security advisory for CVE-2024-55591, an authentication bypass using an alternate path or channel vulnerability in FortiOS and FortiProxy. A remote threat actor can craft requests to the Node.js websocket module to gain super-admin privileges.

SOAR into 2025: SOAR's evolving role in security and beyond

Security Orchestration, Automation, and Response (SOAR) is rapidly evolving to meet the demands of modern security teams. As organizations face increasing threats and complexity, choosing the right SOAR solution has never been more critical. Join Matt Muller, Field CISO at Tines, and Andrew Green, Networking & Security Research Analyst at GigaOm, for an in-depth discussion on the state of the SOAR market and what’s next for security automation.

CrowdStrike Falcon for Legacy Systems: Modern Security for Legacy Environments

Many organizations across critical industries such as healthcare, manufacturing and energy rely on legacy Windows operating systems to run essential equipment. These systems, while operationally vital, are notoriously difficult and costly to upgrade — leaving them vulnerable to modern cyber threats. CrowdStrike is addressing this challenge by expanding our legacy support with the general availability of CrowdStrike Falcon for Legacy Systems.

CrowdStrike Insider Risk Services Defend Against the Threats Within

Insider threats are among the most elusive and damaging forms of cybersecurity risk. According to the Ponemon Institute, 71% of organizations experienced between 21 and 41 insider incidents in 2023, up 67% over the previous year. The average annual cost of insider threats also climbed to $16.2 million per organization, the report found.

Operation 99: North Korea's Cyber Assault on Software Developers

On January 9, the SecurityScorecard STRIKE team uncovered Operation 99, a cyberattack by the Lazarus Group, North Korea’s state-sponsored hacking unit. This campaign targets software developers looking for freelance Web3 and cryptocurrency work. If you thought fake job offers from the group’s Operation Dream Job campaign were bad, this latest move is a masterclass in deception, sophistication, and malicious intent. Here’s why Operation 99 demands your attention.

Integrate Jira Data Center With GitGuardian For Real-Time Secrets Detection

We are excited to announce that Jira Data Center users can now leverage GitGuardian to perform real-time scanning for secrets in issues and comments. We have supported Jira Cloud with real-time scanning for some time, but now teams that run their own private versions of the popular project management tool, helping teams plan, track, and release work. You can install GitGuardian on multiple Jira Data Center sites to monitor your projects.

Integrate Bitbucket Cloud With GitGuardian's Secrets Detection Platform Now Supports

We are proud to announce that BitBucket Cloud users can now leverage the GitGuardian Secrets Detection platform to find hardcoded secrets throughout their existing codebases and actively monitor any code changes for newly leaked credentials. We have supported Bitbucket Data Center and Sever for years, but now, teams managing code on bitbucket.org can reap those same benefits. Integration is very simple and straightforward.