ADR Blocks Spike in Cyber Attacks and Sharp Rise in Path Traversal Attacks  | April Attack Data | Contrast Security

ADR Blocks Spike in Cyber Attacks and Sharp Rise in Path Traversal Attacks | April Attack Data | Contrast Security

Customers using Application Detection and Response (ADR) technology blocked a remarkable number of attacks over the past month. For the second time since we began writing this monthly report, we’ve seen a ...
Ransomware Exploits Windows Zero-Day CVE-2025-29824 to Breach U.S.

Ransomware Exploits Windows Zero-Day CVE-2025-29824 to Breach U.S.

| | vulnerability
How CVE-2025-29824 was exploited by ransomware actors. Discover mitigation strategies and enhance your cybersecurity posture today! ...
SonicBoom Attack: Hackers Bypass Authentication and Gain Control

SonicBoom Attack: Hackers Bypass Authentication and Gain Control

SonicBoom attack chain and learn how to protect your organization from critical vulnerabilities. Stay secure with our expert insights ...
Insecure Deserialization Trend | March Attack Data | Contrast Security

Insecure Deserialization Trend | March Attack Data | Contrast Security

Cyberattackers are shifting their strategy in attacking applications and focusing on one of the most dangerous tactics. For the fourth straight month, the number one tactic was insecure deserialization, aka untrusted deserialization ...
Application Detection and Response Analysis: Why ADR? How ADR Works, and ADR Benefits

Application Detection and Response Analysis: Why ADR? How ADR Works, and ADR Benefits

Two highly respected technology analysts from different cybersecurity disciplines are coming together to recommend that companies consider Application Detection and Response. Organizations face a constant barrage of cyber threats, including zero-day vulnerabilities ...
Cybersecurity Insights with Contrast CISO David Lindner | 03/14/25

Cybersecurity Insights with Contrast CISO David Lindner | 03/14/25

Insight No. 1 — We are frogs, falling asleep in security-debt stew Companies are drowning in high-risk software security debt, with critical vulnerabilities festering for an average of 252 days before they’re ...
Breaking Basta: Insights from Black Basta’s Leaked Ransomware Chats

Breaking Basta: Insights from Black Basta’s Leaked Ransomware Chats

Key Takeaways During the period covered by the Black Basta leaked chat logs (18 September 2023 – 28 September 2024), […] ...
Enhancing Application Security | Contrast ADR and Splunk | Contrast Security

Enhancing Application Security | Contrast ADR and Splunk | Contrast Security

Have you silenced WAF alerts in your SIEM or just stopped sending them altogether? You're not alone. Many SOCs find themselves overwhelmed by the sheer volume of noise generated by traditional WAFs, ...
Healthcare Crisis Emerges: Cybersecurity Vulnerabilities in Patient Monitors Confirmed by FDA

Healthcare Crisis Emerges: Cybersecurity Vulnerabilities in Patient Monitors Confirmed by FDA

 For over a decade, we warned the healthcare industry this was coming. They ignored us. Their sole focus was HIPAA compliance — checking regulatory boxes rather than securing critical systems. We told them that ...
RansomHub Affiliate leverages Python-based backdoor

RansomHub Affiliate leverages Python-based backdoor

In an incident response in Q4 of 2024, GuidePoint Security identified evidence of a threat actor utilizing a Python-based backdoor […] ...