Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Hunting with Elastic Security: Detecting command and scripting interpreter execution

Stealthy adversaries continually exploit system utilities to execute malicious code. A particularly potent and frequently misused tactic is MITRE ATT&CK T1059 - Command and Scripting Interpreter, wherein attackers harness built-in interpreters like PowerShell, Bash, Python, or JavaScript to run arbitrary commands.

Lesson from Blue Shield CA's Google Analytics Breach Risk

On April 9, 2025, Blue Shield of California sent shockwaves through the healthcare industry with a data breach notification revealing that protected health information (PHI) may have been shared with Google Ads for nearly three years due to a misconfigured Google Analytics setup. This incident, affecting an undisclosed number of members, underscores the critical risks of noncompliance with HIPAA rules for online tracking technologies.

What Is a DMARC Record? A Simple Guide With Examples...

If you’ve ever wondered how companies can protect their emails from being hijacked or used for malicious purposes, the answer you’re looking for is DMARC (Domain-based Message Authentication, Reporting, and Conformance). A DMARC record is an auxiliary security configuration that can be a difference-maker in the battle between legitimate senders and threat actors. It serves as a reliable mechanism to deal with rogue emails and stave off spoofing and other email-based threats.

How LivePerson automates vulnerability management to reduce risk

For modern security teams, managing vulnerabilities efficiently is critical to reducing risk and maintaining a strong security posture. However, the sheer volume of vulnerabilities, complex IT environments, and resource constraints make traditional approaches unsustainable. Automating key aspects of vulnerability management not only speeds up remediation, but also ensures consistency and accuracy across the entire vulnerability lifecycle.

Falcon Cloud Security - AWS IAM Identity Center Detections

CrowdStrike Falcon Cloud Security can automatically identify IAM Identity Center user risks, such as use of stale user accounts, suspicious web-based activity and address them before attackers strike. Subscribe and Stay Updated: ► Don't miss out on more exciting content! Subscribe to our channel for the latest updates, case studies, and more from the world of cybersecurity. Hit the bell icon to receive notifications whenever we post new videos.

CrowdStrike Falcon Next-Gen SIEM: Log Collector Fleet Management

Efficient log collection is only half the battle—managing your collectors at scale is just as critical. With Fleet Management, CrowdStrike makes it easy to scale and maintain your log infrastructure, delivering enhanced visibility, control, and actionable insights for your SIEM operations. In this demo, we walk through how the Fleet Management simplifies the deployment, configuration, monitoring, and management of collectors across your environment.

The FTC Is Watching: GoDaddy's Settlement Sends a Clear Message on API Security

In today’s rapidly changing digital environment, APIs play a crucial role in modern business, facilitating smooth connectivity and data sharing. Yet, this interconnected nature brings significant security and privacy risks, as evidenced by the Federal Trade Commission's (FTC) recent settlement with GoDaddy. This settlement serves as a stark reminder that strong API security is no longer just a good security practice but is now a legal obligation.

Is Perplexity AI Safe to Use? Security Flaws in the Android App

The rapid rise of AI-powered applications brings innovation, but also security blind spots. As AI systems become integral to our daily lives, their security must keep pace with their capabilities. This is the focus of our AI Security Testing Series, where we analyze popular AI applications for vulnerabilities that could put users at risk. In our last analysis, we tested Deepseek’s Android app and uncovered critical security flaws.

8 Tips for Kubernetes Role-Based Access Control (RBAC)

The weakest link in your infrastructure might just be your permissions. In Kubernetes, permissions exist to protect your cluster, but if you’re not careful, they can become your number one problem. How? A single misconfigured access role in a Kubernetes cluster can open the door to a full-scale security breach. Yes, your network policies and firewalls are in place, but when a bad actor can kubectl delete a namespace from inside your cluster, the real breach point is access control.