Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI SOC Market Landscape 2025: Torq Leads With Hyperautomation

The SACR 2025 AI SOC Market Landscape Report just dropped, and Torq was named one of the “most feature-rich platforms” on the market. Not because we bolted a chatbot onto triage. But because we’ve built an AI SOC platform modern security teams actually need: an AI-native, execution-first infrastructure that operationalizes intelligence at scale. And that platform works.

Exploiting API4 - 8 Real-World Unrestricted Resource Consumption Attack Scenarios (and How to Stop Them)

Unrestricted Resource Consumption (API4:2023) is the only threat category in the OWASP API Security Top 10 explicitly dedicated to Denial of Service (DoS) and resource abuse. But despite being just one category, attackers can exploit it in many different ways; from large file uploads and expensive GraphQL queries to abuse of metered third-party services like SMS gateways or AI/LLM APIs.

Introducing the Arctic Wolf AI Security Assistant: Providing Value for Security Operations for Beta Customers

Arctic Wolf recently introduced its AI Security Assistant, a cutting-edge generative AI security assistant designed to enhance security operations within the Aurora Platform. This innovative tool is now in beta and promises to deliver deeper security expertise instantly to users.

Can threat actors make ChatGPT malware? #ai #cybersecurity #gpt5

GPT-5 was jailbroken in under 24 hours using simple "storytelling" techniques that bypass safety guardrails. The key insight from our podcast? Individual AI requests appear legitimate but become dangerous when combined. Bad actors can request network code in one session, convincing emails in another, and credential collection forms in a third. Each task seems normal individually, but together they form a complete phishing toolkit.

How a volunteer-run wildfire site in Portugal stayed online during DDoS attacks

On July 31, 2025, just as Portugal entered the peak of another intense wildfire season, João Pina, also known as Tomahock, received an automated alert from Cloudflare. His volunteer-run project, fogos.pt, now a trusted source of real-time wildfire information for millions across Portugal, was under attack. One of the several alerts fogos.pt received related to the DDoS attack.

MURKY PANDA: A Trusted-Relationship Threat in the Cloud

Since 2023, CrowdStrike Services and CrowdStrike Counter Adversary Operations have investigated multiple intrusions conducted by MURKY PANDA, a sophisticated adversary leveraging advanced tradecraft to compromise high-profile targets. MURKY PANDA, active since at least 2023, is a cloud-conscious adversary with a broad targeting scope; the adversary’s operations have particularly focused on government, technology, academia, legal, and professional services entities in North America.

Can You Kill an API Token in Real Time? Here's Why It Matters #apikeys #api #incidentresponse

What happens if an API token or key is compromised? The ability to instantly revoke or block tokens during an incident is critical to stopping attackers. In this clip, Wallarm and Oracle experts discuss real-world challenges in detecting and disabling malicious tokens—and why mature incident response and tooling are essential for API security.