Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CrowdStrike 2025 European Threat Landscape Report: Extortion Rises, Nation-State Activity Intensifies

Europe remains a prime target for global adversaries. Financially motivated eCrime groups continue to target the region as espionage and hacktivism escalate amid geopolitical turmoil stemming from ongoing conflicts. The CrowdStrike 2025 European Threat Landscape Report, based on frontline intelligence from CrowdStrike’s elite threat hunters and intelligence analysts, provides a definitive view of adversaries operating within or targeting Europe.

Kroll Conversations: Meet the DFIR Experts

A cyberattack is one of the most devastating experiences a company can go through. Yet for Jaycee Roth and Justin Harvey, being there for organizations when the worst happens is business-as-usual. As part of the Digital Forensics and Incident Response (DFIR) team within Kroll’s Cyber and Data Resilience business, their guidance and support ensures companies can recover fully from the disruption caused by a security incident.

Report: AI Poisoning Attacks Are Easier Than Previously Thought

Attackers can more easily introduce malicious data into AI models than previously thought, according to a new study from Antropic. Poisoned AI models can produce malicious outputs, leading to follow-on attacks. For example, attackers can train an AI model to provide links to phishing sites or plant backdoors in AI-generated code.

The Legacy of Agent-Based Backup

Historically, agent-based backup systems have been the norm. These systems operate by running software on the production machine, in tandem with the production application. The agent must communicate with its central data protection server for backups to be executed. The agent’s role is to read production data through the OS layer, process it, and transmit backup data to a media or backup server, where it is ultimately stored on a typically proprietary backup storage device.

What is RTO? Why Recovery Time Objective Matters for Businesses

A business experiences numerous threats daily. The survival of a business depends on how quickly it can resume its operations after incidents that compromise critical infrastructure or applications. Many companies face unexpected situations that cause service interruptions and generate system unavailability. They require rapid restoration to reduce the financial losses. Competition in the business world is fiercer than ever.

What Is RPO (Recovery Point Objective)? Meaning, Importance, and Best Practices

Every business expects smooth operations without any downtime and data loss. But that happens only in a perfect world. In the real world, systems go down and data gets lost, forcing teams to work on recovery plans. But how do recovery plans work? For that, it’s important to understand Recovery Point Objective (RPO), a key part of any disaster recovery or business continuity strategy.

How to monitor MCP server activity for security risks

The Model Context Protocol (MCP) is a popular framework for connecting AI agents to data sources, such as APIs and databases. Because this technology is still new and evolving, its security standards are also in the early stages. This means that MCP servers are susceptible to misuse, so teams building and running them internally need visibility into server interactions to keep their environments safe from attacks.

Fintech compliance: A guide to risks and regulations in 2025

While fintech has helped streamline operations for financial institutions and everyday consumers, it has also introduced new risks that you must account for. According to the CyberCube Global Threat Outlook H1-2024, fintech is one of the top five sectors with the highest exposure to cybersecurity threats.

Smarter Support, Safer Systems: How AI Service Desks and Intent Signals Boost Security & Revenue

Support isn't just about solving customer issues but it's about safeguarding every digital interaction. As remote work expands and customer expectations rise, service desks have quietly become the frontlines of both user experience and cybersecurity. Yet, many organizations still rely on outdated, manual workflows that leave room for breaches, data exposure, or simply delayed responses that frustrate users and erode trust.