#threat-detection

[ follow ]
Information security
fromTechzine Global
2 days ago

Okta publishes open-source detection rules for Auth0

A GitHub-hosted Customer Detection Catalog delivers ready-to-use Sigma detection rules for Auth0, enabling faster, broader threat detection and community contributions.
#cybersecurity
Tech industry
fromHackernoon
9 months ago

Today's Threats Move Fast-Your SIEM Needs to Move Faster | HackerNoon

Security teams need AI-driven monitoring for real-time threat detection and deep forensics.
fromTechzine Global
2 weeks ago

Upwind drafts in Nyx for cloud security keyhole surgery

Upwind's acquisition of Nyx enhances application security through function-level runtime visibility for real-time threat detection and vulnerability prioritization.
fromTechzine Global
2 weeks ago

The browser is the next security frontier: how do we secure it?

Browsers have become critical endpoints and attack vectors, necessitating improved security measures that current EDR solutions can't provide.
Privacy professionals
fromForbes
1 month ago

Google Play Store Warning-Find And Delete All Apps On This List

Users should delete over 350 malicious apps identified by Human Security's Satori team that generate unwanted ad requests.
fromTechzine Global
1 month ago

Thales introduces API security against BOLA attacks

API security is no longer optional - it's fundamental to maintaining business continuity and trust. Without robust measures, organizations risk significant data and trust losses.
Information security
fromInfoQ
2 months ago

AWS Introduces Extended Threat Detection for EKS via GuardDuty

AWS's expansion of GuardDuty's capabilities now includes runtime monitoring for EKS clusters, enhancing threat detection for container-level threats through managed eBPF technology.
DevOps
fromSecuritymagazine
2 months ago

Fog Ransomware Group Uses Unconventional Toolset, New Research Finds

The real danger in this case isn't the ransom note - it's how Fog turns a simple screen-recorder into a hidden camera. Software is an essential driver of growth and innovation for every company; however, business apps we install on autopilot can suddenly become spy tools, which means trust is the weak spot. Security teams should keep a live map of where every monitoring app is allowed to run and flag it the moment one pops up somewhere odd.
Information security
fromSecuritymagazine
2 months ago

78% of Security Leaders Say Tool Sprawl Challenges Threat Mitigation

Organizations are overwhelmed by security tools, leading to ineffective management and heightened security risks.
#ai
fromThe Hacker News
3 months ago

Meta Launches LlamaFirewall Framework to Stop AI Jailbreaks, Injections, and Insecure Code

Meta launched LlamaFirewall, an open-source AI security framework to address cyber risks in AI systems.
fromTechzine Global
3 months ago

Sumo Logic unifies security for faster threat detection

New security features by Sumo Logic enhance threat detection and response capabilities using AI and automation.
fromTechzine Global
3 months ago

Permiso links risk management to threat detection with new platform

Permiso's platform uniquely addresses identity threats by combining risk management with comprehensive monitoring of both human and non-human identities across environments.
Privacy professionals
fromThe Hacker News
4 months ago

Product Walkthrough: A Look Inside Wing Security's Layered SaaS Identity Defense

Understanding that most SaaS breaches stem from identity misconfigurations is critical to improving security.
Adopting a comprehensive approach to visibility in SaaS applications can significantly reduce attack vectors.
fromThe Hacker News
4 months ago

Cybersecurity in the AI Era: Evolve Faster Than the Threats or Get Left Behind

AI is rapidly transforming cybersecurity, necessitating skilled application by defenders.
While AI can enhance threat detection, improper implementation increases risks.
[ Load more ]