Topic: threat detection
-
Secure Your Microsoft 365 & Hybrid Identity with Cayosoft Guardian
Cayosoft Guardian Protector offers free, real-time threat detection and monitoring for Microsoft hybrid identity environments, including Active Directory and Entra ID, to defend against ransomware and insider threats without licensing costs. It provides comprehensive visibility and immediate aler...
Read More » -
ManageEngine Reduces SOC Alert Fatigue with Reengineered Detection
Security operations centers are overwhelmed by excessive alerts, making it difficult to distinguish critical threats from irrelevant noise. ManageEngine's Log360 introduces a reengineered detection system that reduces false positives and improves threat coverage with over 1,500 prebuilt, continuo...
Read More » -
Illumio's AI Agent Slashes Alert Fatigue, Speeds Threat Response
Illumio's Insights Agent tackles alert fatigue by providing real-time, tailored alerts and one-click remediation recommendations, helping security teams prioritize and neutralize threats efficiently. The system delivers persona-based AI guidance, offering role-specific risk assessments and action...
Read More » -
Flowmon ADS 12.5: Effortless Threat Detection Made Simple
Progress Software has launched Flowmon ADS 12.5, an AI-powered anomaly detection system designed to simplify threat identification and provide enhanced network visibility for organizations. The solution addresses challenges like alert fatigue and resource constraints, especially for midsize busin...
Read More » -
ManageEngine Log360 Update Cuts SOC Alert Fatigue
Security operations centers are overwhelmed by excessive data and false alerts, which often obscure critical threats. ManageEngine's Log360 update introduces smarter threat detection, filtering out irrelevant alerts and reducing false positives by up to 90%. The platform includes a centralized de...
Read More » -
Illumio's AI Agent Automates Threat Detection and Containment
Illumio's Insights Agent is an AI-driven tool that provides real-time threat detection and one-click containment to help security teams respond faster and reduce alert fatigue. The Agent uses role-aware intelligence to deliver personalized threat insights and automated remediation steps, tailored...
Read More » -
Uncover Malicious OAuth Apps in Microsoft 365 with Cazadora
Auditing OAuth applications in Microsoft 365 is critical due to the high risk of malicious apps, which can severely compromise security. Use an open-source script to identify suspicious apps by checking for indicators like mimicry of user names, generic names, or anomalous reply URLs. Huntress re...
Read More » -
AI Security: Outsmart Evolving Cyber Threats
Organizations face increasingly sophisticated cyber threats that require proactive, AI-enhanced security measures to anticipate and block novel attacks before they cause damage. AI-powered systems revolutionize security workflows by processing vast datasets to eliminate false positives, highlight...
Read More » -
4 Time-Saving Strategies to Boost Security Monitoring
Traditional SIEM systems face challenges with data latency, storage costs, and processing overhead, making it difficult to balance comprehensive security visibility with budget constraints. Time series data approaches enable faster anomaly detection and long-term threat hunting by providing immed...
Read More » -
Secure Your Future: Building Trust in AI Security
AI integration in cybersecurity enables proactive threat detection and faster responses by analyzing large datasets beyond human capabilities. The growth of machine-generated data is driving adoption of federated analytics and edge-based detection to manage information without centralized storage...
Read More » -
Akira Ransomware Hijacks Victim's Remote Management Tool
Hackers used the trusted Datto RMM tool and a Living Off The Land strategy to deploy Akira ransomware, disguising their actions as normal IT operations to avoid detection. The attack was halted by Barracuda Managed XDR, which detected the encryption activity and immediately isolated the compromis...
Read More » -
Beyon Cyber and Haven Partner to Launch AI-Powered SOC Services
Beyon Cyber and Haven Cyber Technologies have formed a strategic alliance to deploy advanced AI-driven Security Operations Centers globally, enhancing threat defense through automation and intelligent workflows. The partnership integrates Beyon Cyber's Orryx AI platform into Haven's infrastructur...
Read More » -
Detect Malicious Traffic with Maltrail: Open-Source Security Tool
Maltrail is an open-source cybersecurity tool that detects malicious network traffic by comparing data against public blacklists of known threats like domains, IPs, and URLs. Its architecture uses sensors to monitor network traffic and send alerts to a central server, which logs events and suppor...
Read More » -
Corelight's AWS Flow Monitoring Ends Cloud Blind Spots
Corelight's new Flow Monitoring solution for AWS provides unified network visibility across cloud and hybrid infrastructures, reducing SIEM and storage costs by up to 90% compared to traditional methods. The solution converts high-volume AWS flow data into enriched, security-focused intelligence,...
Read More » -
Is Your SOC Ready for Business Email Compromise?
Business email compromise (BEC) attacks use psychological manipulation rather than technical exploits, bypassing traditional security by mimicking trusted communications and requiring intensive manual investigation. These scams evade detection because they lack malicious code, making them invisib...
Read More » -
Pure Storage Boosts Cyber Resilience with New Innovations & Partnerships
Pure Storage is enhancing cybersecurity by embedding native threat detection into its storage platform and forming strategic partnerships to proactively identify threats and enable faster recovery. The company is integrating with security leaders like CrowdStrike and Superna to provide real-time ...
Read More » -
Exabeam Launches First Customizable CISO Benchmarking Tool
Exabeam has launched a customizable CISO benchmarking tool in its Nova platform, allowing security leaders to anonymously compare their security posture with similar organizations based on industry, region, and size for actionable insights. The tool evaluates threat detection and system configura...
Read More » -
Cisco ASA Zero-Day & Fortra GoAnywhere Under Active Attack
A wave of sophisticated cyberattacks is exploiting newly discovered zero-day vulnerabilities in critical enterprise infrastructure, including Cisco's ASA and Fortra's GoAnywhere, posing significant risks to organizational networks and sensitive data. Law firms are increasingly targeted by cybercr...
Read More » -
BarracudaONE Launches AI Tools to Simplify MSP Security
Barracuda Networks has upgraded its BarracudaONE platform with AI-driven features to simplify security management, automate billing, and enhance operational efficiency for managed service providers. Key enhancements include bulk remediation for email threats to reduce response times and PSA integ...
Read More » -
Securing AI for Space Exploration
Satellite cybersecurity is a growing challenge due to expanding commercial constellations and reliance on delay-prone communication links, creating multiple vulnerabilities. Artificial intelligence is being explored to automate threat detection and response, with debates focusing on centralized, ...
Read More » -
Illumio and Microsoft Partner to Stop Cyber Breaches at Scale
Microsoft has fully implemented Illumio's Insights and Segmentation platform across its entire corporate IT infrastructure, marking a strategic shift toward proactive, AI-driven cybersecurity to prevent threats from spreading. The partnership was driven by Illumio's ability to meet Microsoft's im...
Read More » -
Go Beyond Checklists: Build a Mature Automotive Cybersecurity Program
A mature automotive cybersecurity program requires a foundation in established frameworks like ISO, but must go beyond compliance by developing a tailored risk management strategy that addresses unique threats and deploys proactive controls across the enterprise. Comprehensive threat visibility, ...
Read More » -
Exabeam Named a Gartner SIEM Leader for 6th Consecutive Year
Exabeam has been recognized as a Leader in the Gartner Magic Quadrant for SIEM for the sixth consecutive year, underscoring its commitment to AI-driven security automation. The company introduced Exabeam Nova, integrating generative AI into analyst workflows to enhance threat detection, investiga...
Read More » -
SentinelOne Acquires Observo AI to Boost SIEM and Security Ops
SentinelOne is acquiring Observo AI to enhance its AI SIEM and data offerings, aiming to create a more open, intelligent, and autonomous security operations framework. The acquisition addresses challenges of high data volumes and costs by integrating Observo's AI-native, real-time telemetry pipel...
Read More » -
Securing Farms from Cyber Threats: A John Deere CISO Q&A
Modern agriculture relies heavily on interconnected, software-driven systems, making cybersecurity as critical as physical equipment to protect the supply chain from threats. John Deere employs a security-by-design approach, integrating protections from development through testing, and collaborat...
Read More » -
Bitdefender & CYPFER: End-to-End Cyber Resilience for Businesses
Bitdefender and CYPFER have partnered to provide end-to-end cyber resilience, integrating incident response, forensic investigation, and rapid recovery into Bitdefender's security portfolio for businesses of all sizes. The collaboration combines Bitdefender's threat detection and intelligence wit...
Read More » -
Unified Exposure Management: The Future of Cyber Defense
The traditional cybersecurity model focused on detecting and responding to breaches is no longer sufficient, as modern organizations require proactive defense strategies to prevent attacks before they occur. A shift towards Unified Exposure Management Platforms (UEMPs) addresses this need by cont...
Read More » -
ManageEngine Unveils AI for Smarter, Safer IT at GITEX 2025
ManageEngine will showcase its comprehensive IT management solutions at GITEX GLOBAL 2025 in Dubai, focusing on enhancing operational efficiency and security for businesses. Key product updates include ServiceDesk Plus Zia AI for intelligent, automated IT support and Log360's improved threat dete...
Read More » -
Top New Infosec Products Released This Week – July 2025
PlexTrac's upgraded Workflow Automation Engine enhances vulnerability management by standardizing processes, automating penetration test findings, and reducing remediation time for improved operational efficiency. Bitdefender's expanded Security for Creators solution now includes Facebook and Ins...
Read More » -
SaaS Security Demand Surges as Data Breaches Rise
Businesses overestimate their SaaS security, with 75% reporting incidents in the past year, a 44% increase from previous figures, highlighting a gap between confidence and actual protection. Many organizations rely too heavily on SaaS providers' security assurances instead of verifying their own p...
Read More » -
3 Must-Haves to Survive a Cyberattack
Swift and effective response to a cyberattack depends on having clarity, control, and a reliable lifeline already in place. Clarity involves real-time detection and understanding of the incident's scope, enabling informed decisions to isolate and manage threats. Control means the ability to conta...
Read More » -
Securing Australia: How AI and Identity Redefine Cybersecurity
Australian businesses face rapidly evolving cybersecurity threats where traditional defenses are inadequate, with attackers now prioritizing immediate execution over stealth using AI to target identity systems. Cloud environments have become particularly vulnerable, with compromised credentials b...
Read More » -
Gurucul AI-IRM: Detect Insider Threats Faster
Gurucul has launched the AI Insider Risk Management (AI-IRM) platform to enhance detection and response to insider threats through autonomous triage and bias-free risk scoring, addressing a sharp rise in such incidents. The platform integrates User and Entity Behavior Analytics (UEBA), identity a...
Read More » -
Neon Cyber Launches Workforce Cybersecurity Platform
Neon Cyber has launched the industry's first Workforce Cybersecurity Platform (WCP), focusing on human-centric threats like phishing and credential misuse to protect users across browsers, SaaS, and enterprise systems. The platform offers AI-driven phishing protection, visibility into shadow IT, ...
Read More » -
AI Skills Key to Solving Cybersecurity Skills Gap: Fortinet
Mastering AI skills is critical for closing the cybersecurity skills gap, but organizations struggle with implementation due to insufficient expertise among teams. Insufficient cybersecurity awareness and training is the primary cause of security breaches, with 86% of organizations experiencing a...
Read More » -
SentinelOne Leads 2025 IDC XDR MarketScape
SentinelOne has been named a Leader in the IDC MarketScape for XDR software in 2025, highlighting its AI-native cybersecurity platform, Singularity, which unifies security data and analytics to combat threats effectively. The platform integrates endpoint, cloud, identity, and generative AI securi...
Read More » -
AI Skills Key to Closing Cybersecurity Gap, Fortinet Finds
A significant cybersecurity skills gap exists, with artificial intelligence expertise being crucial for defense, yet organizations lack professionals to effectively implement AI security tools, creating vulnerabilities. Security breaches are increasing in frequency and severity, with 86% of organ...
Read More » -
Your Own Tools Are Being Weaponized: Here's How to Fight Back
SMEs often neglect cybersecurity, creating vulnerabilities as new threats specifically target the everyday tools businesses rely on, bypassing traditional security measures. A major emerging threat is "living-off-the-land" (LOTL) attacks, where hackers misuse trusted system utilities like PowerSh...
Read More » -
Illumio Joins the Microsoft Sentinel Partner Ecosystem
Illumio has joined the Microsoft Sentinel partner ecosystem, integrating its breach containment capabilities to enhance threat detection and response in hybrid and multi-cloud environments. The partnership leverages Microsoft Sentinel's AI-ready platform, including its unified data lake and Secur...
Read More » -
Stop Hackers Exploiting LOTL Attacks
Attackers increasingly use "Living off the Land" (LOTL) techniques, leveraging legitimate system tools like PowerShell to blend malicious activities with normal operations, making detection difficult. Bitdefender's PHASR technology counters LOTL by learning individual user and endpoint behaviors ...
Read More » -
Hiring Now: Top Cybersecurity Jobs in September 2025
A wide range of top cybersecurity roles are available globally in September 2025, reflecting high demand for experts in protecting digital assets across various industries and work arrangements. Key positions include specialized roles such as Application Security Architect, Chief Information Secu...
Read More » -
AI Drives 2025 Purchases - But Not Without Questions
AI is rapidly becoming a key factor in cybersecurity purchasing decisions, with 73% of organizations already incorporating it into their programs, especially in financial services. Organizations are prioritizing AI to enhance threat response and automate security operations, with 97% seeking bett...
Read More » -
Varonis Interceptor: AI-Powered Email Security
AI-powered email threats are becoming more sophisticated, using deceptive phishing tactics that mimic legitimate communications to bypass traditional security measures. Varonis Interceptor employs a multimodal AI approach, combining vision, language, and behavior models to detect and block advanc...
Read More » -
ClayRat Spyware Infiltrates Android Devices in Russia
ClayRat is an Android spyware operation targeting Russian users through deceptive Telegram channels and fake websites, tricking them into installing malicious apps disguised as legitimate ones like WhatsApp and YouTube. Once installed, the spyware gains extensive access to sensitive data, includi...
Read More » -
FireCloud Total Access: Hybrid SASE That Scales for All Businesses
FireCloud Total Access unifies four security protections into a single cloud-managed platform, offering enterprise-level Zero Trust security accessible to managed service providers and smaller IT teams through WatchGuard Cloud. It replaces traditional VPNs with identity-based access controls, pro...
Read More » -
Cisco ASA Firewalls Remain Vulnerable to Zero-Day Attacks
Approximately 48,000 Cisco ASA devices remain vulnerable to active zero-day attacks, posing ongoing risks globally, with the majority located in the U.S. and other key countries. Attackers have used advanced tactics, including disabling logging and intercepting commands, to exploit vulnerabilitie...
Read More » -
Radware Exposes Critical ChatGPT Zero-Click Vulnerability
Radware discovered "ShadowLeak," a zero-click vulnerability in ChatGPT's Deep Research agent that autonomously extracts sensitive data from OpenAI's cloud servers without user interaction. The exploit allows attackers to trigger a data breach simply by sending an email, as the AI agent processes ...
Read More » -
Gigamon Insights: AI-Powered Threat Detection & Compliance
Gigamon Insights is an AI-driven tool that uses network telemetry to provide real-time threat detection, performance resolution, and compliance support in hybrid cloud environments. It integrates with platforms like Elastic and AWS, enabling analysts to query metadata for actionable insights dire...
Read More » -
Cl0p Gang Hits Oracle in Major Data Theft Campaign
The Cl0p ransomware gang exploited a zero-day vulnerability (CVE-2025-61882) in Oracle E-Business Suite to exfiltrate data and send extortion emails to victims in August 2025. Oracle issued a security advisory for the vulnerability, which allows unauthenticated remote attackers to execute code vi...
Read More » -
Delinea and Microsoft Partner for Identity Security in Microsoft Store
Delinea has joined the Microsoft Security Store Partner Ecosystem, strengthening their long-term collaboration to simplify cybersecurity adoption for organizations globally. As part of the ecosystem, Delinea contributes to development by providing certified solutions and AI agents that integrate ...
Read More »