Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Shai-Hulud Malware Targets Numerous NPM Packages in Second-Wave NPM Supply-Chain Attack

On November 24, 2025, researchers identified a renewed supply-chain attack linked to Shai-Hulud malware, revealing that numerous npm packages had been quietly trojanized following the initial wave of malicious activity in September. This second iteration involved compromised versions of popular packages uploaded between November 21, 2025, and November 23, 2025, with additional compromised packages continuing to surface at the time of writing.

How To Combat AI-Enhanced Social Engineering Attacks

Artificial intelligence (AI) has supercharged social engineering. Global management consulting firm McKinsey & Company reported a 1,200% global surge in phishing attacks since the rise of generative AI in the latter half of 2022. And it’s not just the number of attacks that’s climbing; it’s also the success rate. Arctic Wolf’s Human Risk Behavior Snapshot: 2nd Edition reveals that nearly two-thirds of IT and security leaders self-reported falling for a phishing attempt.

OAIC compliance guide: Australian Privacy Principles (APPs) for web and mobile

The Office of the Australian Information Commissioner’s (OAIC) 2025 approach places more weight on how systems behave than how policies read. It reflects a broader shift that has been building for some time. APP 11, in particular, now rests on understanding the small, routine movements inside modern web and mobile environments. It’s because the environment drift rarely announces itself. New endpoints appear, SDK permissions adjust, and minor code changes influence how data is handled.

Understanding HIPRA: What Health App Companies Must Prepare For

As a health-related technology company, you are not registered as a “healthcare provider”; therefore you are not HIPAA-covered. But under the Health Information Privacy Reform Act (HIPRA), your health app, wearable, or connected device may soon be held to the same privacy and security expectations as one.

The Hidden Dangers of Calendar Subscriptions: 4 Million Devices at Risk

Day-to-day workload can become overwhelming as time passes alongside the growing tasks and responsibilities of both personal and professional lives. Therefore, a well-structured digital calendar may be an essential organizational tool to navigate through the day, helping with the support we need to manage our time and ongoing commitments.

Egnyte Contract Analyst: Making Contracts Simple for Your Team

You’re not reading contracts for fun—you're trying to get your job done. Maybe you’re a finance lead confirming payment terms. Or a project manager checking a vendor’s delivery obligations. Or you’re in construction, trying to verify when a subcontractor’s scope ends or whether change orders trigger new payment terms. But instead of quick answers, you’re staring at a 50-page agreement packed with legalese.

Secure and Productionize Databricks AI Models with the JFrog Platform

It’s well-known that Databricks is a world-class platform for data engineering and ML experimentation. Yet, for most organizations, the challenge isn’t building models; it’s the complex journey from a model in a notebook to a secure, governed, and production-ready application. In this blog, we’ll show you how integrating the JFrog Platform with Databricks bridges that gap.

Black Friday 2025: Aligning Cyber Resilience and Business Goals to Protect Your Retail Business

Black Friday is only days away, and despite many stores sneaking holiday decorations onto their shelves since mid-September, it marks the official start of the December shopping frenzy. The coming days will not only bring a massive surge in sales, but also an equally large spike in cyber threats. For retailers of all sizes, this peak season is prime time for cybercriminals to exploit vulnerabilities.

Digital Asset Custody as the Strategic Foundation for Banking's Digital Future

Most banks approach digital assets with the same assumptions they use for traditional custody. It is a natural starting point, but it does not hold. Digital assets behave differently, and control that once sat inside core systems now has to be applied in the wallet layer. Institutions that understand this now gain meaningful advantages in speed, flexibility, and market positioning.

When cybercrime meets cyberwarfare

Across today’s threat landscape, the divide between cybercrime and cyberwarfare is disappearing. Financially motivated groups and state-sponsored actors rely on the same tactics, techniques, and procedures (TTPs)—exploiting zero-day and one-day vulnerabilities, abusing ransomware-as-a-service (RaaS) platforms, hiding behind proxies, and living off the land (LotL) within legitimate IT environments. They also often target the same enterprises.