Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CrowdStrike Uses Proven Detection Logic for Pre-Deployment Malware Scanning

As organizations embrace DevOps practices and CI/CD pipelines to accelerate software delivery, their greater dependency on third-party components can introduce security risks. Because malware can infiltrate an environment during development, it’s important to check for it ahead of deployment.

Why GDPR Cloud Storage is Important for Businesses

Thanks to the rise of cloud storage, businesses now have a secure platform to store confidential files, client data, and customers' personal information. However, due to the sensitive data businesses store, the General Data Protection Regulation (GDPR) was formed on May 25, 2018. The GDPR protects individuals' privacy and personal data in the EU.

Cybercriminals targeting the legal sector

Cybercrime targeting law firms has surged by 77% in the past year, raising significant concerns for the legal sector. The frequency, nature, and motivations of these attacks are evolving, putting law firms in a vulnerable position. Due to the sensitive nature of their data and high stakes, law firms are frequent targets for financially motivated cybercriminals, hacktivists, and even state-sponsored groups.

December 2024 Uptick in Social Engineering Campaign Deploying Black Basta Ransomware

Since December 16, 2024, Arctic Wolf has observed increased activity in a social engineering campaign associated with Black Basta ransomware. In this campaign, threat actors were observed using Microsoft Quick Assist and Teams to impersonate IT personnel and engage in malicious activities upon contacting victims. This is a continuation of the Black Basta campaign we reported on in a security bulletin sent in June 2024.

Add more context to Cloud SIEM detections and investigations with Datadog Reference Tables

A primary goal for security teams is identifying specific threats to their environment, but they often face the daunting task of reviewing vast amounts of log data and alerts. Even with well-crafted detection rules, sifting through irrelevant data to pinpoint essential details for an investigation can be a significant challenge. This not only prolongs investigation times but also increases the risk of overlooking critical information.

Secure by Design: A Commitment to Robust Cybersecurity

In an age where cyber threats are increasingly sophisticated and prevalent, organizations must prioritize integrating security into the very core of their technology. Security can no longer be an afterthought or a box to check; it needs to be part of the design and development process from the start.