Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Stopping BadUSB, Rubber Ducky, and Flipper Zero Attacks

BadUSB, Rubber Ducky, and Flipper Zero devices bypass traditional USB blocking by impersonating keyboards and executing commands at machine speed. Netwrix Endpoint Management combines Endpoint Protector’s device control with Policy Manager’s privilege enforcement to block rogue devices, remove unnecessary admin rights, and contain lateral movement before it escalates.

Advance AI and Cyber Oversight With Kovrr's Control Assessment

‍Conducting a risk assessment has become a baseline requirement, not merely an internal best practice, for building effective GRC programs. Whether their focus is on cybersecurity or the newer frontier of AI, assessments offer a systematic means of illuminating an organization’s current exposure and providing visibility into how safeguards are working across both domains. For many teams, however, beginning the assessment remains a challenge.

Automotive IoT Cybersecurity in 2025: WP.29 and the Global Shift to Secure Connected Vehicles

The automotive industry is undergoing its most dramatic transformation in over a century. As vehicles become increasingly connected, autonomous, and software-defined, cybersecurity has emerged as a critical safety issue. What was once a niche concern is now a core requirement for manufacturers, regulators, and consumers. Automotive IoT security has become essential for protecting connected cars from security risks.

Inside the Fireblocks Network for Payments in Asia Pacific

In the Asia-Pacific region, the crypto-native trading firms that built the digital asset market have expanded into new roles, becoming liquidity providers and on-ramps and off-ramps for institutions. They are increasingly using stablecoins to serve PSPs, ecommerce platforms, marketplaces for gaming, creators, and freelancers, and supply chain businesses that need to move money quickly.

Welcome to Dojo AI: Where AI agents strengthen your SOC

For too long, security has been defined by reaction, responding to every alert, chasing every anomaly, burning time and energy without clarity. But the strongest fighters don’t swing at every feint. They train, prepare, and conserve their energy for the moments that matter. That’s not just strength; that’s resilience. Now, this philosophy has entered the SOC. And it has a name: Sumo Logic Dojo AI.

zerodayx1: Hacktivist groups turning to ransomware operations

In July 2025, pro-Palestinian hacktivist group zerodayx1 launched its own Ransomware-as-a-Service (RaaS) operation, following the path of other hacktivist teams. They loudly announced the initiative on platforms commonly used for such purposes, including X (formerly Twitter) and Telegram. Zerodayx1 exemplifies the ongoing evolution of these groups, underscoring the importance of studying and understanding their methods in order to better prepare for and respond to such threats.

Regulatory Gaps and Legacy Systems Are Aiding AI-Powered Cyberattacks on Governments

Public sector organizations face unprecedented cybersecurity challenges as artificial intelligence reshapes how adversaries launch attacks. Threat actors now use AI to execute large-scale, highly personalized phishing campaigns, automate the discovery of vulnerabilities, and evade detection faster than traditional defenses can respond.

Snyk Ranked #51 on 2025 Forbes Cloud 100 List

We’re thrilled to share that Snyk has, for the sixth time and fifth consecutive year, been named to the Forbes Cloud 100 ranked at, recognizing the world’s most innovative private cloud companies. This year’s recognition is especially meaningful, reflecting the bold step we took in May to launch the AI Trust Platform, reorienting Snyk around a single mission — securing the future of AI-native software development.

Scattered Spider: What You Need to Know

Founded around 2022, Scattered Spider is a well-known group of young, English-speaking threat actors believed to be from the US and UK. The group—which has some members as young as 16—first gained global recognition in September 2023 when they successfully hacked the internal systems of both Caesars Entertainment and MGM Resorts, obtaining sensitive data they used to extort the casinos.