Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Ephemeral accounts don't leave an audit trail, and that's a problem

Ephemeral accounts are temporary, high-privilege accounts created for short-term use. They’re a convenient way to get quick, temporary access to systems, data or applications for one-off tasks. Need temporary admin rights for a few minutes? Just create an ephemeral account, complete your task and move on. But behind the convenience of these temporary credentials loom serious security threats.

Harvest Now, Decrypt Later: Why Enterprises Must Prepare Now

In Dune, Frank Herbert’s eponymous sci-fi work, there is a phrase that is often repeated – ‘fear is the mind killer’. We can juxtapose this saying with the cybersecurity landscape, as the fear of not being future-ready is what keeps CISOs up at night. The very thought that a cybersecurity strategy, created and implemented with great effort, won’t be able to keep every evolving and increasingly sophisticated threat at bay is disconcerting.

Olymp Loader: A new Malware-as-a-Service written in Assembly

Olymp Loader is a Malware-as-a-Service (MaaS) advertised on underground forums and Telegram since June 5, 2025. The seller, “OLYMPO”, presents Olymp Loader as fully written in assembly language and frequently markets it as FUD (Fully UnDetectable). Despite its recent appearance, many underground forum users have already posted positive reviews.

Microsoft 365: What Are Your Duties Within The Shared Responsibility Model

Microsoft operates under the Shared Responsibility Model. This means that certain areas of security tasks are your duties, as a customer, and some are the cloud provider’s while others may be a shared responsibility. Most importantly, Microsoft is responsible for its global infrastructure, including each data center and the uptime of the Microsoft 365 service. Your responsibility as the user is to manage and protect your customer data within the Microsoft ecosystem.

Is AI really new-or just automation with better branding?

“AI is just automation by a different name.” It’s a bold claim—but one that Brandon Heller, CTO and co-founder of Forward Networks, and Howard Holton, CEO of GigaOm, unpack in a way that will make you think. In their recent conversation on Discovering Disruptions in Tech, they make the case that artificial intelligence, especially generative AI, is not delivering brand-new capabilities.

Navigating the EU Data Act: Why orchestration helps

Over the past decade, data has evolved from being an operational byproduct to becoming one of the most valuable assets of any business. The explosion of IoT devices, cloud applications, and AI-driven systems has generated unprecedented volumes of personal and non-personal data. Alongside this growth, regulations in the EU have progressed in step.

AI vs. Human: What SpamGPT Means for the Future of Security

Phishing is not new. But SpamGPT has changed the game by showing how AI can industrialize deception at scale. SpamGPT has quickly become the poster child for how attackers are using AI to industrialize old tricks. At its core, SpamGPT isn’t introducing a new kind of attack; it’s simply making phishing faster, cheaper, and more convincing. Phishing has always been about deception. But with AI generating endless, polished, and context-aware lures, the balance of power shifts.

New AI-Driven Phishing Platform Automates Attack Campaigns

Researchers at Varonis warn of a new phishing automation platform called “SpamGPT” that “combines the power of generative AI with a full suite of email campaign tools.” While previous phishing kits have automated parts of the attack chain, SpamGPT’s sophistication sets it apart from the rest “SpamGPT’s interface and features imitate a professional email marketing service, but for illegal purposes,” Varonis writes.