Topic: threat detection

  • ManageEngine Reduces SOC Alert Fatigue with Reengineered Detection

    ManageEngine Reduces SOC Alert Fatigue with Reengineered Detection

    Security operations centers are overwhelmed by excessive alerts, making it difficult to distinguish critical threats from irrelevant noise. ManageEngine's Log360 introduces a reengineered detection system that reduces false positives and improves threat coverage with over 1,500 prebuilt, continuo...

    Read More »
  • Flowmon ADS 12.5: Effortless Threat Detection Made Simple

    Flowmon ADS 12.5: Effortless Threat Detection Made Simple

    Progress Software has launched Flowmon ADS 12.5, an AI-powered anomaly detection system designed to simplify threat identification and provide enhanced network visibility for organizations. The solution addresses challenges like alert fatigue and resource constraints, especially for midsize busin...

    Read More »
  • ManageEngine Log360 Update Cuts SOC Alert Fatigue

    ManageEngine Log360 Update Cuts SOC Alert Fatigue

    Security operations centers are overwhelmed by excessive data and false alerts, which often obscure critical threats. ManageEngine's Log360 update introduces smarter threat detection, filtering out irrelevant alerts and reducing false positives by up to 90%. The platform includes a centralized de...

    Read More »
  • Akira Ransomware Hijacks Victim's Remote Management Tool

    Akira Ransomware Hijacks Victim's Remote Management Tool

    Hackers used the trusted Datto RMM tool and a Living Off The Land strategy to deploy Akira ransomware, disguising their actions as normal IT operations to avoid detection. The attack was halted by Barracuda Managed XDR, which detected the encryption activity and immediately isolated the compromis...

    Read More »
  • Cisco ASA Zero-Day & Fortra GoAnywhere Under Active Attack

    Cisco ASA Zero-Day & Fortra GoAnywhere Under Active Attack

    A wave of sophisticated cyberattacks is exploiting newly discovered zero-day vulnerabilities in critical enterprise infrastructure, including Cisco's ASA and Fortra's GoAnywhere, posing significant risks to organizational networks and sensitive data. Law firms are increasingly targeted by cybercr...

    Read More »
  • SentinelOne Acquires Observo AI to Boost SIEM and Security Ops

    SentinelOne Acquires Observo AI to Boost SIEM and Security Ops

    SentinelOne is acquiring Observo AI to enhance its AI SIEM and data offerings, aiming to create a more open, intelligent, and autonomous security operations framework. The acquisition addresses challenges of high data volumes and costs by integrating Observo's AI-native, real-time telemetry pipel...

    Read More »
  • Securing Farms from Cyber Threats: A John Deere CISO Q&A

    Securing Farms from Cyber Threats: A John Deere CISO Q&A

    Modern agriculture relies heavily on interconnected, software-driven systems, making cybersecurity as critical as physical equipment to protect the supply chain from threats. John Deere employs a security-by-design approach, integrating protections from development through testing, and collaborat...

    Read More »
  • ManageEngine Unveils AI for Smarter, Safer IT at GITEX 2025

    ManageEngine Unveils AI for Smarter, Safer IT at GITEX 2025

    ManageEngine will showcase its comprehensive IT management solutions at GITEX GLOBAL 2025 in Dubai, focusing on enhancing operational efficiency and security for businesses. Key product updates include ServiceDesk Plus Zia AI for intelligent, automated IT support and Log360's improved threat dete...

    Read More »
  • Top New Infosec Products Released This Week – July 2025

    Top New Infosec Products Released This Week – July 2025

    PlexTrac's upgraded Workflow Automation Engine enhances vulnerability management by standardizing processes, automating penetration test findings, and reducing remediation time for improved operational efficiency. Bitdefender's expanded Security for Creators solution now includes Facebook and Ins...

    Read More »
  • SaaS Security Demand Surges as Data Breaches Rise

    SaaS Security Demand Surges as Data Breaches Rise

    Businesses overestimate their SaaS security, with 75% reporting incidents in the past year, a 44% increase from previous figures, highlighting a gap between confidence and actual protection. Many organizations rely too heavily on SaaS providers' security assurances instead of verifying their own p...

    Read More »
  • 3 Must-Haves to Survive a Cyberattack

    3 Must-Haves to Survive a Cyberattack

    Swift and effective response to a cyberattack depends on having clarity, control, and a reliable lifeline already in place. Clarity involves real-time detection and understanding of the incident's scope, enabling informed decisions to isolate and manage threats. Control means the ability to conta...

    Read More »
  • Gurucul AI-IRM: Detect Insider Threats Faster

    Gurucul AI-IRM: Detect Insider Threats Faster

    Gurucul has launched the AI Insider Risk Management (AI-IRM) platform to enhance detection and response to insider threats through autonomous triage and bias-free risk scoring, addressing a sharp rise in such incidents. The platform integrates User and Entity Behavior Analytics (UEBA), identity a...

    Read More »
  • Neon Cyber Launches Workforce Cybersecurity Platform

    Neon Cyber Launches Workforce Cybersecurity Platform

    Neon Cyber has launched the industry's first Workforce Cybersecurity Platform (WCP), focusing on human-centric threats like phishing and credential misuse to protect users across browsers, SaaS, and enterprise systems. The platform offers AI-driven phishing protection, visibility into shadow IT, ...

    Read More »
  • Your Own Tools Are Being Weaponized: Here's How to Fight Back

    Your Own Tools Are Being Weaponized: Here's How to Fight Back

    SMEs often neglect cybersecurity, creating vulnerabilities as new threats specifically target the everyday tools businesses rely on, bypassing traditional security measures. A major emerging threat is "living-off-the-land" (LOTL) attacks, where hackers misuse trusted system utilities like PowerSh...

    Read More »
  • AI Drives 2025 Purchases - But Not Without Questions

    AI Drives 2025 Purchases - But Not Without Questions

    AI is rapidly becoming a key factor in cybersecurity purchasing decisions, with 73% of organizations already incorporating it into their programs, especially in financial services. Organizations are prioritizing AI to enhance threat response and automate security operations, with 97% seeking bett...

    Read More »
  • FireCloud Total Access: Hybrid SASE That Scales for All Businesses

    FireCloud Total Access: Hybrid SASE That Scales for All Businesses

    FireCloud Total Access unifies four security protections into a single cloud-managed platform, offering enterprise-level Zero Trust security accessible to managed service providers and smaller IT teams through WatchGuard Cloud. It replaces traditional VPNs with identity-based access controls, pro...

    Read More »
  • Radware Exposes Critical ChatGPT Zero-Click Vulnerability

    Radware Exposes Critical ChatGPT Zero-Click Vulnerability

    Radware discovered "ShadowLeak," a zero-click vulnerability in ChatGPT's Deep Research agent that autonomously extracts sensitive data from OpenAI's cloud servers without user interaction. The exploit allows attackers to trigger a data breach simply by sending an email, as the AI agent processes ...

    Read More »
  • Gigamon Insights: AI-Powered Threat Detection & Compliance

    Gigamon Insights: AI-Powered Threat Detection & Compliance

    Gigamon Insights is an AI-driven tool that uses network telemetry to provide real-time threat detection, performance resolution, and compliance support in hybrid cloud environments. It integrates with platforms like Elastic and AWS, enabling analysts to query metadata for actionable insights dire...

    Read More »
  • Pure Storage Unveils 3-Tier Data Cloud Strategy to Do More With Less

    Pure Storage Unveils 3-Tier Data Cloud Strategy to Do More With Less

    Pure Storage has introduced an Enterprise Data Cloud strategy to unify data management, helping organizations leverage data for AI, improve performance, and eliminate data silos. The strategy is built on three pillars: an Intelligent Control Plane for automation and AI-driven management, a Unifie...

    Read More »
  • 70% of Smart Home Devices Vulnerable to Cyber Attacks, UAE Council Warns

    70% of Smart Home Devices Vulnerable to Cyber Attacks, UAE Council Warns

    70% of smart home devices in the UAE are vulnerable to cyberattacks, largely due to risky user behaviors like weak passwords and unsecured networks. The UAE faces intense cyber threats, including a 30% increase in ransomware and AI-powered attacks like deepfakes and autonomous malware. The UAE ha...

    Read More »
  • Top Infosec Products of August 2025: Your Ultimate Security Guide

    Top Infosec Products of August 2025: Your Ultimate Security Guide

    Advanced security tools are being released to strengthen defenses, automate responses, and adapt to emerging threats across cloud, endpoint, and identity environments. Innovations include AI-driven analytics, identity governance, and autonomous agents that enhance testing, threat simulation, and ...

    Read More »
  • Microsoft Teams Targeted by Fake IT Support Scams

    Microsoft Teams Targeted by Fake IT Support Scams

    A new wave of phishing attacks is exploiting Microsoft Teams, using fake IT support accounts to trick employees into installing malware that gives attackers full network control. Attackers are shifting from email to Teams due to its trusted role in business, impersonating IT staff to deploy remot...

    Read More »
  • 2025's Top Cyber Threats: Ransomware, Outages & AI Attacks

    2025's Top Cyber Threats: Ransomware, Outages & AI Attacks

    The 2025 digital threat landscape is dominated by sophisticated ransomware, third-party vendor disruptions, and AI-driven social engineering campaigns. AI is amplifying social engineering attacks, making them more convincing and accounting for over half of cyber claims and losses in early 2025. R...

    Read More »
  • Supply Chain Shifts Challenge CPS Security Strategies

    Supply Chain Shifts Challenge CPS Security Strategies

    Cyber-physical systems face heightened risks due to supply chain instability and regulatory changes, with 46% of organizations experiencing third-party breaches in the past year. External regulations, rather than internal assessments, are driving security strategies, and 76% of organizations expe...

    Read More »