Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Who Must Comply with DORA? Complete Guide for Businesses

The Digital Operational Resilience Act (DORA) is a critical regulatory framework introduced by the European Union to enhance the digital resilience of the financial sector. It mandates a uniform set of standards for ICT risk management frameworks, digital resilience capabilities, and third-party service oversight. Enforceable by European supervisory authorities, DORA ensures that all covered entities can respond to and recover from major ICT-related incidents, including cyber attacks.

Security Bulletin: ClickFix and the New Era of Social Engineering

ClickFix is an emerging social engineering technique that has gained traction among both cybercriminals and APT groups due to its effectiveness and low barrier to execution. First observed around October 19, 2023, disguised as Cloudflare anti-bot protection, ClickFix deceives users into taking action to “fix” a non-existent issue, often through fake reCAPTCHA pages, spoofed software updates, or fraudulent security prompts.

Automated Baseline Enforcement with Falcon for IT

CrowdStrike Falcon for IT automates baseline enforcement and remediation to eliminate the security gaps adversaries exploit. As devices drift from their original secure state—through unauthorized software, missing updates, or policy deviations—Falcon for IT uses real-time telemetry and Dynamic Targeting to surface misconfigurations and highlight non-compliant endpoints. With tools like Charlotte AI, osquery, and native scripting, teams gain instant visibility into deviations, apply targeted remediation at scale, and enforce standards without disrupting end users.

How Teleport Simplifies Just-in-Time Access

Just-in-time (JIT) access isn’t easy. This Reddit thread of cybersecurity pros surfaces many of the most common JIT headaches — and you may be encountering those same challenges yourself. As noted in the thread, no users should be “swimming in access”, especially as standing privileges and over-permissioned accounts continue to be a major source of breaches. The truth is, many JIT models struggle to keep up with today’s fast-moving, cloud-native environments.

Where Large Language Models (LLMs) meet Infrastructure Identity

Modern infrastructure is already complex, characterized by distributed environments, multi-cloud deployments, and dynamic change. Now add Large Language Models (LLMs) to the mix, and the challenge grows exponentially. Engineering leaders are under pressure to deliver innovation fast, while also safeguarding against breaches, misconfigurations, and human error. That’s why initiatives like eliminating static credentials, enforcing just-in-time access, and reducing SSH key sprawl are gaining traction.

The Shadow AI Data Leak Problem No One's Talking About

Is your team's favorite new productivity tool also your biggest data leak waiting to happen? Generative AI (GenAI) assistants like ChatGPT, Microsoft Copilot, and Google Gemini have quickly moved from novelty to necessity in many workplaces. These tools use machine learning and advanced algorithms to help employees draft content, analyze data, and even write code faster than ever before.

ARMO CADR Uncovers Multiple Crypto Miner Attack Operations

The best way to understand real-world attacks is to observe them in the wild. Following this principle, our research team set up a decoy Kubernetes workload designed to attract malicious actors – a honeypot in a Kubernetes cluster we named the “Honey-pod.” Inside this pod, we deployed Apache Druid, a popular open-source analytics database known for its scalability and, unfortunately, for a history of exploitable vulnerabilities.

Database Monitoring: The Complete Guide

Databases are an integral part of modern IT infrastructure and power almost every modern application. After all, databases store the persistent information that applications run on. That’s why monitoring these databases is crucial: ensuring system health and performance and forming a vital component of any observability practice.

Is SafePay Ransomware Safe?

Safepay is a newcomer to the ransomware landscape. Since its first published attack in October 2024, the group has attacked over 50 organizations worldwide. SafePay maintains a dark web blog and a presence on the TON network for victim communications. The group employs the increasingly common double extortion model, combining data encryption with the theft of sensitive information to pressure victims into payment.

Warning: Ransomware Remains a Top Threat for SMBs

A new report from Sophos found that ransomware attacks accounted for over 90% of incident response cases involving medium-sized businesses in 2024, as well as 70% of cases involving small businesses. “While the overall number of incidents in 2024 was slightly down—in part because of better defenses and the disruption of some major ransomware-as-a-service operators—ransomware-related crime is not fading away,” Sophos says.