#threat-detection

[ follow ]
fromThe Hacker News
3 days ago

The State of AI in the SOC 2025 - Insights from Recent Study

A comprehensive survey of 282 security leaders at companies across industries reveals a stark reality facing modern Security Operations Centers: alert volumes have reached unsustainable levels, forcing teams to leave critical threats uninvestigated. You can download the full report here. The research, conducted primarily among US-based organizations, shows that AI adoption in security operations has shifted from experimental to essential as teams struggle to keep pace with an ever-growing stream of security alerts.
Information security
Psychology
fromCornell Chronicle
1 week ago

Safety first: Babies heighten adults' perception of threats | Cornell Chronicle

Caring for a baby causes adults to perceive environment as more dangerous, increasing threat detection and perceived speed of oncoming cars, especially for crawling infants.
#dlp
fromIT Pro
1 week ago

Getting a grip on digital identity

I think what you're seeing now is the adversaries, the bad guys, they're basically focused on, 'look where's the weakest link, where is the place where we've spent the least?' And infrastructure people are about throughput and speed and access, and security is about protection. And if you have a domain that is split between those two, you're going to find weaknesses.
Information security
Psychology
fromPsychology Today
2 weeks ago

Why Yawns Help Us Spot Spiders and Cockroaches Faster

Contagious yawning functions as a social alarm that increases group vigilance, improving rapid detection of threats like spiders and cockroaches.
#ai
fromIT Pro
4 months ago
Artificial intelligence

How AI agents are being deployed in the real world

The use of AI agents in security enhances threat detection and response efficiency, crucial in light of rising cyber threats.
fromTechzine Global
5 months ago
Artificial intelligence

Vectra AI Analyst assists alert-fatigued security teams

Vectra AI introduces a complete agent portfolio, enhancing threat detection capabilities while reducing security alert noise.
#ai-in-cybersecurity
Information security
fromThe Hacker News
1 month ago

Why SIEM Rules Fail and How to Fix Them: Insights from 160 Million Attack Simulations

Organizations detect only one in seven attacks due to SIEM log collection failures and ineffective detection rules, leaving networks highly vulnerable.
Information security
fromTechzine Global
1 month ago

Okta publishes open-source detection rules for Auth0

A GitHub-hosted Customer Detection Catalog delivers ready-to-use Sigma detection rules for Auth0, enabling faster, broader threat detection and community contributions.
#cybersecurity
Tech industry
fromHackernoon
10 months ago

Today's Threats Move Fast-Your SIEM Needs to Move Faster | HackerNoon

Security teams need AI-driven monitoring for real-time threat detection and deep forensics.
Privacy technologies
fromTechzine Global
1 month ago

Upwind drafts in Nyx for cloud security keyhole surgery

Upwind's acquisition of Nyx enhances application security through function-level runtime visibility for real-time threat detection and vulnerability prioritization.
Privacy technologies
fromTechzine Global
1 month ago

The browser is the next security frontier: how do we secure it?

Browsers have become critical endpoints and attack vectors, necessitating improved security measures that current EDR solutions can't provide.
Privacy professionals
fromForbes
3 months ago

Google Play Store Warning-Find And Delete All Apps On This List

Users should delete over 350 malicious apps identified by Human Security's Satori team that generate unwanted ad requests.
fromTechzine Global
3 months ago

Thales introduces API security against BOLA attacks

API security is no longer optional - it's fundamental to maintaining business continuity and trust. Without robust measures, organizations risk significant data and trust losses.
Information security
fromInfoQ
3 months ago

AWS Introduces Extended Threat Detection for EKS via GuardDuty

AWS's expansion of GuardDuty's capabilities now includes runtime monitoring for EKS clusters, enhancing threat detection for container-level threats through managed eBPF technology.
DevOps
fromSecuritymagazine
3 months ago

Fog Ransomware Group Uses Unconventional Toolset, New Research Finds

The real danger in this case isn't the ransom note - it's how Fog turns a simple screen-recorder into a hidden camera. Software is an essential driver of growth and innovation for every company; however, business apps we install on autopilot can suddenly become spy tools, which means trust is the weak spot. Security teams should keep a live map of where every monitoring app is allowed to run and flag it the moment one pops up somewhere odd.
Information security
fromTechzine Global
5 months ago

Permiso links risk management to threat detection with new platform

Permiso's platform uniquely addresses identity threats by combining risk management with comprehensive monitoring of both human and non-human identities across environments.
Privacy professionals
Privacy professionals
fromThe Hacker News
5 months ago

Product Walkthrough: A Look Inside Wing Security's Layered SaaS Identity Defense

Understanding that most SaaS breaches stem from identity misconfigurations is critical to improving security.
Adopting a comprehensive approach to visibility in SaaS applications can significantly reduce attack vectors.
[ Load more ]