Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Remote Work Security Threats and How to Stop Them

It’s safe to say that remote work is here to stay, and hybrid arrangements seem to be getting a boost in 2025. While flexible work models are highly desirable for employees, they create new cybersecurity challenges for businesses. Remote work has quickly become the norm, causing businesses to rethink security protocols. Implementing security measures outside of a centralized office requires a robust strategy—so how can you effectively mitigate risk while still ensuring operational efficiency?

EP 3 - Building Trust in AI Agents

In this episode of the Security Matters podcast, host David Puner is joined by Lavi Lazarovitz, Vice President of Cyber Research at CyberArk Labs, to explore the transformative impact of AI agents on cybersecurity and automation. They discuss real-world scenarios where AI agents monitor security logs, flag anomalies, and automate responses, highlighting both the opportunities and risks associated with these advanced technologies.

Medusa Ransomware: FBI and CISA Urge Organizations to Act Now to Mitigate Threat

The Medusa ransomware gang continues to present a major threat to the critical infrastructure sector, according to a newly-released joint advisory from the FBI, Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing and Analysis Center (MS-ISAC).

Widespread Fake CAPTCHA Campaign Delivering Malware

Arctic Wolf has recently observed a campaign in which threat actors are compromising widely used websites across various industries and embedding a fake CAPTCHA challenge. When victims visit the site, they are presented with the CAPTCHA challenge or redirected to a site that provides instructions, triggering PowerShell code execution and ultimately leading to the loading of information stealer malware.

Protect Yourself: Social Engineering Fuels SIM Swapping Attacks

Group-IB has published a report on SIM swapping attacks, finding that attackers continue to use social engineering to bypass technical security measures. SIM swapping is a technique in which an attacker takes over a victim’s phone number, which enables them to access the victim’s accounts. This involves tricking the telecom operator into reassigning the victim’s phone number to a SIM card controlled by the attacker.

X-Ray Specs: A Look Inside Trading Card Scalper Innovation

The perfect conditions for both pre-planned and opportunistic scalper attacks are quite simple: limited availability and high demand. The trading card culture – think everything from Pokémon and Magic the Gathering to Panini or Topps football and baseball cards – fuels this fire, with first print editions and special editions held to a higher value than reprints.