Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Top 10 Requirements MSSPs Have for External CTI

MSSPs operate high-availability Security Operations Centres (SOCs), which enable them to deliver 24/7 security services designed to reduce the burden on enterprises in staffing and maintaining operational security capabilities. MSSPs play a pivotal role by extending security operations on behalf of their clients.

5 Ways to Keep AWS Fast with Just-in-Time Access

Modern AWS environments move fast. Engineers spin up EKS clusters for testing, automation pipelines deploy to production, and AI agents trigger infrastructure workflows via Amazon Bedrock. AWS provides ways to manage access primitives such as roles and privileges to keep up with this velocity, such as STS AssumeRole, OIDC federation, IAM Authenticator, and Identity Center. But the challenge isn’t in these primitives themselves. It's the human factor behind the primitives.

Weaponizing AI Coding Agents for Malware in the Nx Malicious Package Security Incident

On August 26–27, 2025 (UTC), eight malicious Nx and Nx Powerpack releases were pushed to npm across two version lines and were live for ~5 hours 20 minutes before removal. The attack also impacts the Nx Console VS Code extension.

CVE-2025-7775: Memory Overflow Vulnerability in Citrix NetScaler ADC and Gateway

On August 26th, 2025, Citrix patched CVE‑2025‑7775, a memory overflow vulnerability in NetScaler ADC and Gateway appliances that allows unauthenticated remote code execution (RCE) and/or denial-of-service. This threat is confirmed to be actively exploited in the wild. Citrix strongly emphasized that no mitigations exist aside from applying the patch immediately.

The API Security Reality Check: Key Takeaways from Q2 2025 API ThreatStats Report

API security has never been more crucial. Vulnerabilities are growing in volume and severity. AI integrations are a burgeoning attack vector. Increasing GraphQL adoption presents hidden dangers. To protect your organization, you must secure your APIs. Keep reading for our key takeaways from the Wallarm Q2 2025 API ThreatStats report – and find out what you need to do to protect yourself.

How to Compress Video Online Without Losing Quality? [Free Methods]

In today's digital world, video content has become one of the most popular sources of entertainment. Thanks to high-speed internet and powerful devices, it has now become very easy and quick to download and save these video files. But downloading high-resolution videos often comes with a challenge: large file size. Oversized video content can cause problems when uploading it to YouTube, sharing it on WhatsApp, or storing it anywhere, including your Google Drive.

DNS Tunneling: The Blind Spot in Your Network Security Strategy

The Domain Name System (DNS) is a critical component of internet infrastructure, responsible for translating human-readable domain names into IP addresses. However, the ubiquitous nature and often-overlooked security aspects of DNS make it a prime target for malicious actors. This blog post investigates the tools used for data exfiltration over DNS, the techniques involved, and the countermeasures to mitigate these threats.

Investigating the Oyster Backdoor Campaign and its Targeting of IT Professionals

BlueVoyant investigated the latest Oyster malware attacks, delivered in a widespread campaign targeting IT professionals by impersonating legitimate IT tools. The campaign was originally discovered by outside researchers, but when BlueVoyant’s SOC observed suspicious behavior in a client environment within the healthcare sector, the team, including the Threat Fusion Cell (TFC), decided to delve deeper.

Clickjacking: What it means for 1Password users

This blog details how 1Password has addressed clickjacking in the latest version of our browser extension (version 8.11.7). We have no indication that this class of vulnerability directly puts 1Password’s systems at risk. Clickjacking is a technique where a malicious or compromised webpage visually disguises or overlays elements of a page or browser extension, like the autofill menu, so that a user unintentionally clicks on them.