threat detection

Understanding the Cookie-Bite MFA Bypass Risk
The Cookie-Bite attack is an advanced evolution of Pass-the-Cookie exploits. This tactic bypasses Multi-Factor Authentication (MFA) by leveraging stolen authentication cookies—such as Azure Entra ID’s ESTSAUTH and ESTSAUTHPERSISTENT—to impersonate users ...

Safeguarding SAP Systems Amid Rising Financial Fraud and Economic Stress
SAP systems are the backbone of enterprise finance—and they’re under attack. As economic pressures rise, so do attempts to exploit financial platforms. From insider threats to ransomware and zero-day vulnerabilities, SAP’s critical role ...

The Rise of AI-Driven Cyberattacks: Accelerated Threats Demand Predictive and Real-Time Defenses
Artificial intelligence (AI) is transforming industries, but it’s also empowering cybercriminals to launch sophisticated, high-speed cyberattacks. AI-driven attacks, particularly those orchestrated by autonomous AI agents, operate at an accelerated pace, compressing the ...

Volt Typhoon, Salt Typhoon & APT41: This is No Longer a Drill
New threat intelligence confirms what many infrastructure leaders have long feared: Chinese state-sponsored threat groups are not only capable of infiltrating U.S. critical systems—they already have ...
The Fast Flux DNS Threat: A Call to Action Against a Geopolitical and Hacktivist Nightmare
Artificial Intelligence (AI) has quickly become an integral part of modern workflows, with AI-powered applications like copilots, chatbots, and large-scale language models streamlining automation, decision-making, and data processing. However, these same tools ...

AI vs. Cybercriminals: Who Wins the Race in Next-Gen Threat Detection?
AI allows cybercriminals to circumvent traditional detection systems, and they continue to develop sophisticated methods to enable this ...

Threat Research Report: How AI Assistants, Co-Pilots, and Chatbots Create New Cyber Threats
Artificial Intelligence (AI) has quickly become an integral part of modern workflows, with AI-powered applications like copilots, chatbots, and large-scale language models streamlining automation, decision-making, and data processing. However, these same tools ...

OpenText Adds AI Threat Detection Module to Platform
OpenText added a threat detection module to its core platform that makes use of artificial intelligence to more accurately surface anomalies ...

MixMode Uncovers Nation-State Attacks, Insider Threats, and Regulatory Risks in Critical Infrastructure Environment within 3 Days of Deployment
In our newest MixMode report, we break down how a critical infrastructure provider uncovered active nation-state and insider threats within three days of deploying our AI-driven security platform ...

Enhancing Application Security | Contrast ADR and Splunk | Contrast Security
Have you silenced WAF alerts in your SIEM or just stopped sending them altogether? You're not alone. Many SOCs find themselves overwhelmed by the sheer volume of noise generated by traditional WAFs, ...