Threat Detection and Response
The Fast Flux DNS Threat: A Call to Action Against a Geopolitical and Hacktivist Nightmare
MixMode Threat Research | | Blog, Cyber Threats, insider threats, Nation-State Threat Actors, Real Time Threat Detection, threat brief, threat detection, Threat Detection and Response, Threat Intelligence Research, Threat Research, Zero-day threats
Artificial Intelligence (AI) has quickly become an integral part of modern workflows, with AI-powered applications like copilots, chatbots, and large-scale language models streamlining automation, decision-making, and data processing. However, these same tools ...

Threat Research Report: How AI Assistants, Co-Pilots, and Chatbots Create New Cyber Threats
MixMode Threat Research | | Blog, Cyber Threats, insider threats, Nation-State Threat Actors, Real Time Threat Detection, threat brief, threat detection, Threat Detection and Response, Threat Intelligence Research, Threat Research, Zero-day threats
Artificial Intelligence (AI) has quickly become an integral part of modern workflows, with AI-powered applications like copilots, chatbots, and large-scale language models streamlining automation, decision-making, and data processing. However, these same tools ...

Unsafe Deserialization Attacks Surge | December Attack Data | Contrast Security
Contrast Marketing | | API security, Application Detection and Response (ADR), Application Security, blocked attacks, cyberattacks, Cybersecurity, Log4Shell, threat detection, Threat Detection and Response, unsafe deserialization, vulnerability, Web Application Firewall (WAF)
Attacks on individual applications were down month to month in December 2024, but one of the most dangerous types of attacks was up significantly. That’s according to data Contrast Security publishes monthly ...

Understanding Application Detection and Response (ADR) | Contrast Security
Contrast Marketing | | ADR, Application Detection and Response (ADR), Application Security (AppSec), Data breach, Runtime Application Security Protection (RASP), Security Operations Center (SOC), Software Composition Analysis (SCA), Threat Detection and Response, vulnerability, Web Application Firewall (WAF), zero-days
The Application Security (AppSec) landscape is changing fast. With recent high-profile breaches and a wave of new Application Detection and Response (ADR) solutions hitting the market, it's crucial to understand why legacy ...

Cybersecurity Insights with Contrast CISO David Lindner | 12/13/24
David Lindner, Director, Application Security | | ADR, CISA Vulnrichment, CVE Enrichment, CVSS scores, Cybersecurity Collaboration, cybersecurity funding, NIST CVE Backlog, Runtime Application Security, Threat Detection and Response, Vulnerability Management, zero-day exploits
Insight No. 1: Stop patching the CVE dumpster fire with Vulnrichment It's time to integrate the crucial data — Common Vulnerability Scoring System (CVSS) scores and other crucial information — from CISA's Vulnrichment program ...
Unify & Conquer: How Open XDR Streamlines Your Security Operations
In today’s rapidly evolving cybersecurity landscape, staying ahead of threats requires innovation, agility, and robust partnerships. At Assura, we’re dedicated to providing our clients with the most advanced and effective cybersecurity solutions ...

Beyond Your Mess for Less: How Managed Services can Provide Sustainable Solutions for Organizational Cybersecurity
Joe Nocera | | Cyber Maturity, cyber-risk, Cybersecurity, delivery efficiencies, expense pressure, human capital, increased automation, managed services, managed services provider, predictable fee structures, risk reduction capabilities, security, Threat Detection and Response
A managed service provider must work with each client to determine the level of support needed and improve the service over time to meet changing business needs ...
Security Boulevard

Harnessing the Power of Advanced AI to Optimize Security
Joe Ariganello | | AI, AI Cybersecurity, Blog, Cyber Threats, Cybersecurity using AI, generative AI, Real Time Threat Detection, Third Wave AI, threat detection, Threat Detection and Response
Organizations continue to face increasingly sophisticated cyber threats that require a proactive and adaptive approach to cybersecurity. As the volume and complexity of security data grows, security professionals are turning to advanced ...

Augmenting Legacy Controls with AI-driven Threat Detection and Response
Joe Ariganello | | Blog, identity threat detection and response, Real Time Threat Detection, threat detection, Threat Detection and Response, Threat Detection Investigation and Response, whitepaper
As organizations grapple with the limitations of legacy security controls in the face of increasingly sophisticated cyber threats, integrating AI-driven threat detection and response capabilities presents a compelling opportunity to bolster their ...

How AI and Automation Can Secure Enterprises and Startups
Dr. May Wang | | AI, Automation, Cybersecurity, machine learning, SOC, Threat Detection and Response
Today’s developers face myriad challenges. On the one hand, today’s threat landscape continues to evolve, with new threats becoming more targeted and sophisticated. On the other hand, the speed of innovation has ...
Security Boulevard