Attackers turn trusted OAuth apps into cloud backdoors

Attackers are increasingly abusing internal OAuth-based applications to gain persistent access to cloud environments, Proofpoint researchers warn. These apps often remain unnoticed for quite some time and allow attackers to maintain access to high-priv… Continue reading Attackers turn trusted OAuth apps into cloud backdoors

3 DevOps security pitfalls and how to stay ahead of them

In this Help Net Security video, Dustin Kirkland, SVP of Engineering at Chainguard, explores three of the most pressing DevOps security issues engineers encounter: unpatched code, legacy systems, and the rise of AI and automation. He explains how each … Continue reading 3 DevOps security pitfalls and how to stay ahead of them

GPT needs to be rewired for security

LLMs and agentic systems already shine at everyday productivity, including transcribing and summarizing meetings, extracting action items, prioritizing critical emails, and even planning travel. But in the SOC (where mistakes have real cost), today’s m… Continue reading GPT needs to be rewired for security

Are auto-updates a sufficient security model for a public facing server?

I’ve been starting up a couple of public facing servers throughout the past couple months. Mostly small or personal operations. But I’m also not too familiar with more complex security models.
Although my servers are not large enough to un… Continue reading Are auto-updates a sufficient security model for a public facing server?

Are auto-updates a sufficient security model for a public facing server?

I’ve been starting up a couple of public facing servers throughout the past couple months. Mostly small or personal operations. But I’m also not too familiar with more complex security models.
Although my servers are not large enough to un… Continue reading Are auto-updates a sufficient security model for a public facing server?

Are auto-updates a sufficient security model for a public facing server?

I’ve been starting up a couple of public facing servers throughout the past couple months. Mostly small or personal operations. But I’m also not too familiar with more complex security models.
Although my servers are not large enough to un… Continue reading Are auto-updates a sufficient security model for a public facing server?

LLMs can boost cybersecurity decisions, but not for everyone

LLMs are moving fast from experimentation to daily use in cybersecurity. Teams are starting to use them to sort through threat intelligence, guide incident response, and help analysts handle repetitive work. But adding AI into the decision-making proce… Continue reading LLMs can boost cybersecurity decisions, but not for everyone

CISOs brace for a new kind of AI chaos

AI is being added to business processes faster than it is being secured, creating a wide gap that attackers are already exploiting, according to the SANS Institute. The scale of the problem Attackers are using AI to work at speeds that humans cannot ma… Continue reading CISOs brace for a new kind of AI chaos

AI Emerges as the Hope—and Risk—for Overloaded SOCs

With security teams drowning in alerts, many suppress detection rules and accept hidden risks. AI promises relief through automation and triage—but without human oversight, it risks becoming part of the problem.
The post AI Emerges as the Hope—and Risk… Continue reading AI Emerges as the Hope—and Risk—for Overloaded SOCs