Open-source vulnerability scanner Nuclei patched a critical flaw in its open-source vulnerability management tool ProjectDiscovery. Security firm Wiz uncovered the flaw, a signature verification system flaw that could allow attackers to execute malicious code using custom code templates.
Artificial intelligence is reshaping managed detection and response operations, says Deepwatch CEO John DiLullo. He outlines the company’s strategies for enhancing threat response, integrating tools, and tackling key challenges like staff shortages and evolving attack vectors.
Adversaries are exploiting legitimate processes in endpoint and cloud environments, bypassing detection by leveraging native systems. In the cloud, misconfigured environments and stolen credentials are driving the threat landscape, said Terrance DeJesus, senior security research engineer, Elastic.
New CEO Bill Welch discusses Sysdig's cloud security strategy, emphasizing AI, open-source leadership with Falco, and expansion plans to serve SMBs and midmarket businesses. He shares goals for real-time response and building a sustainable, profitable company.
If 2024 was the year in which cybercriminals experimented more with AI/ML in the refinement and scale of their attacks, then 2025 must be the year when cyber defenders evolve to better embrace AI in their defenses. These are among the 2025 threat predictions by Fortinet's Derek Manky.
Industrial control systems (ICS) play a vital role in critical infrastructure, yet new research from Bitsight's TRACE team has exposed multiple critical vulnerabilities in Automated Tank Gauge (ATG) systems. Join experts Jake Olcott, VP of Government Affairs, and Pedro Umbelino, Principal Research Scientist, as they...
Cyberattacks are evolving at unprecedented speed, scale and sophistication. When every second counts, you need an experienced cybersecurity partner that can help you mitigate and recover from an attack quickly and effectively.
Unit 42® is proud to be recognized as a Leader in The Forrester Wave™: Cybersecurity...
The ever-expanding threat landscape keeps evolving, and it is easy to overlook key areas that could expose your organization. However, you can stay ahead of constantly evolving threats and gain peace of mind with this comprehensive checklist.
These recommendations, abstracted from the latest 2022 Unit 42 Incident...
Kaseya’s SaaS Alerts acquisition promises a streamlined experience for MSPs by enhancing integrations with existing products. According to CEO Jim Lippie, SaaS Alerts' current and future users can expect more seamless, automated solutions with a 20% developer expansion dedicated to MSP security.
Filigran’s $35 million Series B funding, led by Insight Partners, positions the company to scale its threat intelligence and proactive security capabilities while expanding its U.S. footprint. Plans include doubling the engineering team and strengthening breach and attack simulation capabilities.
In this report, Palo Alto Networks Unit 42™ research team shares current trends in malware and the evolving threat landscape. This includes an analysis of the most common types of malware and their distribution methods.
With the growing volume and sophistication of today’s threats, it’s critical for network...
This 2024 threat-hunting report, highlights the trends observed in the past 12 months. Also, it talks about how to utilize proactive, intelligence-informed threat hunting to relentlessly track, detect, and ultimately disrupt the adversary no matter when or where they operate.
Learn how modern adversaries are...
The landscape of Operational Technology (OT) security is rapidly evolving, as industrial operations increasingly fall victim to frequent and devastating cyberattacks, particularly ransomware. This comprehensive guide delves into the current state of OT security, highlighting the critical challenges faced by industrial...
Visa has signed a definitive agreement to acquire AI-driven fraud prevention leader Featurespace. This acquisition will reinforce Visa's fraud detection capabilities, integrating advanced machine learning technology to strengthen financial crime prevention and protect global transactions.
More than 1.7 million customers in South Australia depend on SA Power Networks to build and maintain their energy infrastructure. This leading utility takes its responsibility to all these customers extremely seriously.
In this case study, SA Power knew it was important to strengthen their email security to avoid...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.