Topic: threat detection
-
Secure Your Microsoft 365 & Hybrid Identity with Cayosoft Guardian
Cayosoft Guardian Protector offers free, real-time threat detection and monitoring for Microsoft hybrid identity environments, including Active Directory and Entra ID, to defend against ransomware and insider threats without licensing costs. It provides comprehensive visibility and immediate aler...
Read More » -
ManageEngine Reduces SOC Alert Fatigue with Reengineered Detection
Security operations centers are overwhelmed by excessive alerts, making it difficult to distinguish critical threats from irrelevant noise. ManageEngine's Log360 introduces a reengineered detection system that reduces false positives and improves threat coverage with over 1,500 prebuilt, continuo...
Read More » -
Illumio's AI Agent Slashes Alert Fatigue, Speeds Threat Response
Illumio's Insights Agent tackles alert fatigue by providing real-time, tailored alerts and one-click remediation recommendations, helping security teams prioritize and neutralize threats efficiently. The system delivers persona-based AI guidance, offering role-specific risk assessments and action...
Read More » -
Flowmon ADS 12.5: Effortless Threat Detection Made Simple
Progress Software has launched Flowmon ADS 12.5, an AI-powered anomaly detection system designed to simplify threat identification and provide enhanced network visibility for organizations. The solution addresses challenges like alert fatigue and resource constraints, especially for midsize busin...
Read More » -
ManageEngine Log360 Update Cuts SOC Alert Fatigue
Security operations centers are overwhelmed by excessive data and false alerts, which often obscure critical threats. ManageEngine's Log360 update introduces smarter threat detection, filtering out irrelevant alerts and reducing false positives by up to 90%. The platform includes a centralized de...
Read More » -
Illumio's AI Agent Automates Threat Detection and Containment
Illumio's Insights Agent is an AI-driven tool that provides real-time threat detection and one-click containment to help security teams respond faster and reduce alert fatigue. The Agent uses role-aware intelligence to deliver personalized threat insights and automated remediation steps, tailored...
Read More » -
Uncover Malicious OAuth Apps in Microsoft 365 with Cazadora
Auditing OAuth applications in Microsoft 365 is critical due to the high risk of malicious apps, which can severely compromise security. Use an open-source script to identify suspicious apps by checking for indicators like mimicry of user names, generic names, or anomalous reply URLs. Huntress re...
Read More » -
AI Security: Outsmart Evolving Cyber Threats
Organizations face increasingly sophisticated cyber threats that require proactive, AI-enhanced security measures to anticipate and block novel attacks before they cause damage. AI-powered systems revolutionize security workflows by processing vast datasets to eliminate false positives, highlight...
Read More » -
4 Time-Saving Strategies to Boost Security Monitoring
Traditional SIEM systems face challenges with data latency, storage costs, and processing overhead, making it difficult to balance comprehensive security visibility with budget constraints. Time series data approaches enable faster anomaly detection and long-term threat hunting by providing immed...
Read More » -
AI in Security: Adoption Lags Behind the Hype
Security leaders widely adopt AI/ML (96%) and value it for reducing alert fatigue and improving detection, but its actual use is often less sophisticated than marketed. Current AI applications are primarily tactical, focusing on core threat detection and automated response, rather than the deep, ...
Read More » -
Top Cybersecurity Jobs Hiring Now: January 2026
The global cybersecurity job market is experiencing high demand for specialized roles, with key positions including Chief Information Security Officers (CISOs), Cyber Defence Specialists, and various types of Security Engineers and Analysts across countries like Australia, France, and the UAE. Sp...
Read More » -
Secure Your Future: Building Trust in AI Security
AI integration in cybersecurity enables proactive threat detection and faster responses by analyzing large datasets beyond human capabilities. The growth of machine-generated data is driving adoption of federated analytics and edge-based detection to manage information without centralized storage...
Read More » -
Akira Ransomware Hijacks Victim's Remote Management Tool
Hackers used the trusted Datto RMM tool and a Living Off The Land strategy to deploy Akira ransomware, disguising their actions as normal IT operations to avoid detection. The attack was halted by Barracuda Managed XDR, which detected the encryption activity and immediately isolated the compromis...
Read More » -
UTMStack: Open-Source UTM for Complete Threat Management
UTMStack is an open-source unified threat management platform that integrates SIEM and XDR functionalities for real-time correlation of security data to detect sophisticated, multi-stage attacks. Its architecture features pre-ingestion analysis for faster response times and is built from the grou...
Read More » -
Cayosoft Guardian SaaS: Always-On Hybrid Identity Protection
Cayosoft Guardian is now available as a SaaS model, launching in Q1 2026, offering zero downtime and no maintenance for continuous identity protection and rapid recovery during attacks. The platform enhances hybrid Microsoft identity security by moving to the cloud, ensuring businesses can mainta...
Read More » -
Netpoleon, Vectra AI Strengthen ANZ Cybersecurity Alliance
Netpoleon and Vectra AI have expanded their strategic alliance to deliver advanced AI-driven Network Detection and Response solutions across Australia and New Zealand, enhancing cybersecurity capabilities for enterprise clients and government agencies. Vectra AI has been recognized as a Leader in...
Read More » -
Beyon Cyber and Haven Partner to Launch AI-Powered SOC Services
Beyon Cyber and Haven Cyber Technologies have formed a strategic alliance to deploy advanced AI-driven Security Operations Centers globally, enhancing threat defense through automation and intelligent workflows. The partnership integrates Beyon Cyber's Orryx AI platform into Haven's infrastructur...
Read More » -
Detect Malicious Traffic with Maltrail: Open-Source Security Tool
Maltrail is an open-source cybersecurity tool that detects malicious network traffic by comparing data against public blacklists of known threats like domains, IPs, and URLs. Its architecture uses sensors to monitor network traffic and send alerts to a central server, which logs events and suppor...
Read More » -
Corelight's AWS Flow Monitoring Ends Cloud Blind Spots
Corelight's new Flow Monitoring solution for AWS provides unified network visibility across cloud and hybrid infrastructures, reducing SIEM and storage costs by up to 90% compared to traditional methods. The solution converts high-volume AWS flow data into enriched, security-focused intelligence,...
Read More » -
Is Your SOC Ready for Business Email Compromise?
Business email compromise (BEC) attacks use psychological manipulation rather than technical exploits, bypassing traditional security by mimicking trusted communications and requiring intensive manual investigation. These scams evade detection because they lack malicious code, making them invisib...
Read More » -
Pure Storage Boosts Cyber Resilience with New Innovations & Partnerships
Pure Storage is enhancing cybersecurity by embedding native threat detection into its storage platform and forming strategic partnerships to proactively identify threats and enable faster recovery. The company is integrating with security leaders like CrowdStrike and Superna to provide real-time ...
Read More » -
Exabeam Launches First Customizable CISO Benchmarking Tool
Exabeam has launched a customizable CISO benchmarking tool in its Nova platform, allowing security leaders to anonymously compare their security posture with similar organizations based on industry, region, and size for actionable insights. The tool evaluates threat detection and system configura...
Read More » -
Cisco ASA Zero-Day & Fortra GoAnywhere Under Active Attack
A wave of sophisticated cyberattacks is exploiting newly discovered zero-day vulnerabilities in critical enterprise infrastructure, including Cisco's ASA and Fortra's GoAnywhere, posing significant risks to organizational networks and sensitive data. Law firms are increasingly targeted by cybercr...
Read More » -
Top Cybersecurity Jobs Hiring Now: January 27, 2026
The global cybersecurity field offers diverse, high-demand career paths ranging from strategic leadership roles like Chief Information Security Officer (CISO) to hands-on technical positions in areas such as penetration testing and incident response. Key responsibilities across these roles includ...
Read More » -
Top 6 Cyber Threats to Watch in 2026
The cybersecurity landscape is defined by a dangerous synergy between AI and human ingenuity, creating adaptive, automated threats that require a proactive, intelligence-driven security posture beyond traditional defenses. Key emerging threats include autonomous agentic AI exploits, weaponized de...
Read More » -
Trend Vision One: Proactive AI Security for Your Environment
Trend Vision One's AI Security Package, launching in December, provides centralized exposure management and protection across the entire AI application lifecycle, from development to runtime operations. The solution addresses the limitations of conventional security tools by offering specialized ...
Read More » -
Stop Malicious PowerShell with New ExtraHop Security Tools
ExtraHop has introduced new security enhancements to detect and neutralize malicious PowerShell activity, which attackers use to operate stealthily within networks by blending in with normal administrative tasks. The platform integrates detection mechanisms that identify specific malicious behavi...
Read More » -
NETSCOUT Enhances Cloud Compliance for Enterprises
NETSCOUT has enhanced its Omnis KlearSight Sensor for Kubernetes to provide deeper visibility for compliance, accelerating threat detection and validating zero-trust policies in response to widespread Kubernetes adoption. The platform addresses compliance risks by capturing packet- and process-le...
Read More » -
Top Cybersecurity Open-Source Tools: October 2025 Edition
This month's selection of open-source cybersecurity tools offers cost-effective solutions for strengthening security across IT environments, including code analysis and network monitoring. Key tools highlighted include Checkov for infrastructure code scanning, DefectDojo for vulnerability managem...
Read More » -
BarracudaONE Launches AI Tools to Simplify MSP Security
Barracuda Networks has upgraded its BarracudaONE platform with AI-driven features to simplify security management, automate billing, and enhance operational efficiency for managed service providers. Key enhancements include bulk remediation for email threats to reduce response times and PSA integ...
Read More » -
Securing AI for Space Exploration
Satellite cybersecurity is a growing challenge due to expanding commercial constellations and reliance on delay-prone communication links, creating multiple vulnerabilities. Artificial intelligence is being explored to automate threat detection and response, with debates focusing on centralized, ...
Read More » -
Illumio and Microsoft Partner to Stop Cyber Breaches at Scale
Microsoft has fully implemented Illumio's Insights and Segmentation platform across its entire corporate IT infrastructure, marking a strategic shift toward proactive, AI-driven cybersecurity to prevent threats from spreading. The partnership was driven by Illumio's ability to meet Microsoft's im...
Read More » -
Go Beyond Checklists: Build a Mature Automotive Cybersecurity Program
A mature automotive cybersecurity program requires a foundation in established frameworks like ISO, but must go beyond compliance by developing a tailored risk management strategy that addresses unique threats and deploys proactive controls across the enterprise. Comprehensive threat visibility, ...
Read More » -
Exabeam Named a Gartner SIEM Leader for 6th Consecutive Year
Exabeam has been recognized as a Leader in the Gartner Magic Quadrant for SIEM for the sixth consecutive year, underscoring its commitment to AI-driven security automation. The company introduced Exabeam Nova, integrating generative AI into analyst workflows to enhance threat detection, investiga...
Read More » -
SentinelOne Acquires Observo AI to Boost SIEM and Security Ops
SentinelOne is acquiring Observo AI to enhance its AI SIEM and data offerings, aiming to create a more open, intelligent, and autonomous security operations framework. The acquisition addresses challenges of high data volumes and costs by integrating Observo's AI-native, real-time telemetry pipel...
Read More » -
Securing Farms from Cyber Threats: A John Deere CISO Q&A
Modern agriculture relies heavily on interconnected, software-driven systems, making cybersecurity as critical as physical equipment to protect the supply chain from threats. John Deere employs a security-by-design approach, integrating protections from development through testing, and collaborat...
Read More » -
Stellar Cyber Enhances SOC with Agentic AI Automation
Stellar Cyber's 6.3 update embeds "agentic AI automation" to automate the full threat lifecycle, aiming to reduce analyst workload and improve response times across security environments. The release integrates the "Model Context Protocol (MCP)" for third-party tools and features like **AI-ge...
Read More » -
AI-Generated Malware: The Real Threat vs. The Hype
Google's report identifies five AI-generated malware samples, all of which are unsophisticated and pose minimal real-world cybersecurity risk compared to professional threats. The malware, including PromptLock, lacks advanced features like persistence and evasion, functioning as proof-of-concepts...
Read More » -
OpenText AI Boosts Enterprise Security for Identity, Data & Apps
OpenText has launched a suite of cybersecurity enhancements that integrate AI into security workflows, unifying protection across identity, data, applications, and forensics with tools like Core Threat Detection and Core Identity Foundation. The CE 25.4 release strengthens compliance with built-i...
Read More » -
Bitdefender & CYPFER: End-to-End Cyber Resilience for Businesses
Bitdefender and CYPFER have partnered to provide end-to-end cyber resilience, integrating incident response, forensic investigation, and rapid recovery into Bitdefender's security portfolio for businesses of all sizes. The collaboration combines Bitdefender's threat detection and intelligence wit...
Read More » -
Unified Exposure Management: The Future of Cyber Defense
The traditional cybersecurity model focused on detecting and responding to breaches is no longer sufficient, as modern organizations require proactive defense strategies to prevent attacks before they occur. A shift towards Unified Exposure Management Platforms (UEMPs) addresses this need by cont...
Read More » -
ManageEngine Unveils AI for Smarter, Safer IT at GITEX 2025
ManageEngine will showcase its comprehensive IT management solutions at GITEX GLOBAL 2025 in Dubai, focusing on enhancing operational efficiency and security for businesses. Key product updates include ServiceDesk Plus Zia AI for intelligent, automated IT support and Log360's improved threat dete...
Read More » -
Top New Infosec Products Released This Week – July 2025
PlexTrac's upgraded Workflow Automation Engine enhances vulnerability management by standardizing processes, automating penetration test findings, and reducing remediation time for improved operational efficiency. Bitdefender's expanded Security for Creators solution now includes Facebook and Ins...
Read More » -
SaaS Security Demand Surges as Data Breaches Rise
Businesses overestimate their SaaS security, with 75% reporting incidents in the past year, a 44% increase from previous figures, highlighting a gap between confidence and actual protection. Many organizations rely too heavily on SaaS providers' security assurances instead of verifying their own p...
Read More » -
3 Must-Haves to Survive a Cyberattack
Swift and effective response to a cyberattack depends on having clarity, control, and a reliable lifeline already in place. Clarity involves real-time detection and understanding of the incident's scope, enabling informed decisions to isolate and manage threats. Control means the ability to conta...
Read More » -
500 npm Packages Infected by Shai-Hulud Malware Leaking Secrets
Over 500 npm packages, including popular tools like Zapier and Postman, have been compromised by the Shai-Hulud malware, which steals developer secrets and uploads them to rapidly multiplying GitHub repositories. The attack uses trojanized versions of legitimate packages to inject malicious scrip...
Read More » -
Securing Australia: How AI and Identity Redefine Cybersecurity
Australian businesses face rapidly evolving cybersecurity threats where traditional defenses are inadequate, with attackers now prioritizing immediate execution over stealth using AI to target identity systems. Cloud environments have become particularly vulnerable, with compromised credentials b...
Read More » -
Gurucul AI-IRM: Detect Insider Threats Faster
Gurucul has launched the AI Insider Risk Management (AI-IRM) platform to enhance detection and response to insider threats through autonomous triage and bias-free risk scoring, addressing a sharp rise in such incidents. The platform integrates User and Entity Behavior Analytics (UEBA), identity a...
Read More » -
Neon Cyber Launches Workforce Cybersecurity Platform
Neon Cyber has launched the industry's first Workforce Cybersecurity Platform (WCP), focusing on human-centric threats like phishing and credential misuse to protect users across browsers, SaaS, and enterprise systems. The platform offers AI-driven phishing protection, visibility into shadow IT, ...
Read More » -
6 Overlooked Okta Security Settings You Must Check Now
Securing identity providers like Okta is critical as they act as central gatekeepers for digital access, with risks arising from misconfigurations and evolving threats. The article outlines six essential Okta security practices, including robust password policies, phishing-resistant MFA, and feat...
Read More »