Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Detecting Living-off-the-Land Attacks in OT Networks

The most dangerous attacker inside your OT network right now may not have brought a single piece of malware with them. They’re using your own tools. Your own administrative credentials. Your own scheduled tasks and remote management utilities to execute malicious commands, move laterally, and quietly pre-position for a future disruption. This is living-off-the-land (LOTL), the dominant attack technique in critical infrastructure targeting today.

How Does Endpoint Deception Detect Attacks Before Damage Happens?

Let’s be honest. EDR has improved endpoint security dramatically over the last few years. It catches malware, blocks suspicious processes, and alerts on abnormal behavior. But no tool is perfect. Every detection model has blind spots. Attackers know this. They test environments. They move carefully. They use living-off-the-land techniques, stolen credentials, and legitimate tools. Sometimes, they move in ways that don’t immediately trigger alarms.

Agentic AI Security: Automated False Positive Suppression

LimaCharlie's Agentic SecOps Workspace (ASW) is a platform where AI doesn't just advise, it acts. By connecting to your security infrastructure via API, the ASW executes operations end-to-end at a fraction of the cost of traditional AI SOC platforms. The result is genuine AI security automation that operates independently and serves as a force multiplier, giving every analyst on your team access to senior-level expertise. Alert fatigue is one of the most persistent challenges in security operations.

Securing Endpoints With Keeper: Eliminating Local Admin Risk Without Slowing Users Down

Watch the recording of our exclusive webinar featuring Craig Lurey, CTO & Co-Founder of Keeper Security, and see how Keeper Endpoint Privilege Manager (EPM) removes standing admin privileges, enforces least-privilege access and blocks common attack paths, all while maintaining a seamless user experience.

Why Static Privilege Models Break Down in Agentic AI Security

Earlier this year, AWS experienced a 13-hour outage that was reportedly linked to one of its own internal AI coding tools. Apparently, their Kiro agentic coding tool thought that there was an issue with the code in the environment, and that the best way to fix it was to simply burn it to the ground.

Joomla SAML SSO with Salesforce | Step-by-Step SAML SP Setup Guide

Stop managing separate passwords! In this comprehensive tutorial, we’ll show you how to configure SAML Single Sign-On (SSO) for Joomla using Salesforce as your Identity Provider (IdP). By the end of this video, your users will be able to log in to your Joomla site securely using their Salesforce credentials, creating a frictionless enterprise experience.

Discover Exposed AI Infrastructure with Indusface WAS

You track your web applications. You inventory your APIs. But is anybody monitoring your AI servers? Just last week research found that there were more than 175,000 exposed versions of Ollama, an AI server popular for self-hosting LLMs. Across enterprises, self-hosted model servers are being deployed on cloud VMs and GPU-backed instances to power copilots, internal automation, and experimental AI features.

Why EDR isn't enough on its own

Editor's note: The following guest contribution is by Tanium Domain Acrchitect, Jim Kelly Think about your last security event. Was your team confident nothing was missed? Were there questions about where else this could have left persistence? Most often we are left with uncertainty. That uncertainty can show up in every serious incident. An alert fires, the SOC responds. The immediate threat looks like it is contained.

PerplexedBrowser: Accepting a Meeting or Handing Your Local Files to an Attacker?

How a routine calendar invite enabled silent local file access and data exfiltration Note: This post is part of a coordinated disclosure by Zenity Labs detailing the PleaseFix vulnerability family affecting the Perplexity Comet Agentic Browser. This blog focuses on browser-level autonomous agent execution and session compromise.

100 SaaS Apps. One Query. Zero Alerts: How Glean and Claude Cowork Expose the Agentic AI Data Risk

A sales rep opened Glean—an AI-powered enterprise search platform that connects to your company's SaaS apps and lets anyone query across all of them in natural language—typed "Who are my top 10 customers?" and got a clean, formatted list pulled from Salesforce, cross-referenced with HubSpot, and confirmed against data sitting in Google Drive. They copy-pasted that list into a personal Gmail draft. No alerts fired. No policies triggered. No one noticed. This isn't a hypothetical.