Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Can Digital Strategies Support Patient Retention in Healthcare?

Picture this: your team works hard to bring in new patients, but many never return for a second visit. They slip through the cracks, and you only feel the loss when revenue starts to dip. The truth is, keeping patients is often easier and cheaper than finding new ones-you've already done half the work. The challenge is staying connected in a way that feels natural, not pushy. The good news? A few smart digital tools can help you keep patients engaged, informed, and coming back, all without adding more work to your staff's day.

Emerging Threat: CVE-2025-41115 - Critical SCIM Privilege Escalation in Grafana Enterprise

CVE-2025-41115 is a critical privilege escalation and user-impersonation vulnerability in Grafana Enterprise. The issue occurs within the SCIM (System for Cross-domain Identity Management) provisioning feature. When SCIM is enabled, Grafana incorrectly maps the externalId field supplied by a SCIM client to an internal user.uid.

Continuous workforce identity assurance: Our key focus at the Gartner IAM Summit

Security leaders are rethinking how they establish and maintain identity assurance across the employee life cycle as workforce fraud and AI-driven impersonation accelerate. And as threats increase, confidence is dropping. At a recent CISO event, more than 85% of security leaders told us they’re only somewhat confident or not confident at all in their ability to handle GenAI-enabled fraud.

Improving in-page notifications in the 1Password browser extension

The 1Password browser extension is entering its eighth year of service, and quite a bit has changed over that time as we’ve built new capabilities and improvements. One crucial piece of the browser extension is its in-page notification system. With the ability to display a notification on a web page, it allows you to perform many important tasks.

Beyond Web App Firewalls: How XDR Strengthens SQL Injection Prevention

The Critical Gap in Your SQL Injection Defense Your Web Application Firewall isn’t enough anymore. Despite WAF deployments, sophisticated SQL injection attacks continue bypassing perimeter defenses, with attackers exploiting JSON-based payloads, encoding techniques, and behavioral evasion methods that traditional signature-based detection simply cannot catch. Recent authoritative research reveals alarming trends.

How Airlines Can Stop Loyalty Account Takeovers Before Miles Are Stolen

The airline industry faces a critical security threat that cuts directly into profits and customer trust: loyalty account takeover (ATO) fraud. Frequent flyer miles function as a highly liquid digital currency. This drives a surge in theft across US carriers and global networks. Attackers are increasingly sophisticated. They use automated kits and deepfake phishing to seize accounts and quickly convert stolen miles into cash.

DPDP Rules 2025: The New Compliance Era and How AppTrana Helps You Get There

On 14 November 2025, the Government of India notified the Digital Personal Data Protection (DPDP) Rules, 2025, officially activating the DPDP Act, 2023. The Rules transform the law from a policy framework into a fully enforceable compliance regime, starting an 18-month implementation countdown for every business in India.

What is Headless WordPress and How Single Sign On (SSO) Secures It

WordPress powers more than 43% of all websites on the internet, making it the most widely used Content Management System (CMS) for everything from small blogs to enterprise sites. Its popularity comes from being easy to use, flexible, and supported by a large ecosystem of plugins and themes. In recent years, many businesses have started using WordPress in a new way called Headless. Industry research shows that nearly 64% of enterprise companies now use a Headless CMS strategy.

SHA1-Hulud, npm supply chain incident

On November 24th, 2025, we identified a new supply chain attack in the npm ecosystem, referred to as SHA1-Hulud. We believe this is a second wave of the Shai-Hulud attack, which occurred in September 2025. Snyk will continue monitoring this active incident until it is resolved. Updates on this incident will be on our trust center.