Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Jailbreaking 101: How to Set Up Your iOS Device for Security Testing?

Mobile app security can’t afford surface-level assessments. To truly verify how apps handle compromise, security teams must venture deeper, and in the iOS world, that means jailbreaking. Jailbreaking an iOS device grants pentesters the access required to uncover weaknesses otherwise invisible under Apple's sandboxing model. By removing Apple’s built-in restrictions, testers gain deeper access to system files, APIs, and hidden behaviors that standard tools can’t expose.

From Anomaly to Insight: Using Behavioral Analytics to Spot Hidden Threats

The most dangerous attackers don’t break in—they walk through your front door with stolen credentials. Traditional security infrastructure faces a fundamental challenge: advanced persistent threats remain undetected for an average of 287 days, operating within legitimate access boundaries while signature-based defenses remain blind to their activities. When attackers steal credentials or insiders go rogue, they appear as authorized users to existing security infrastructure.

90 Days to SOC Autonomy: How Torq Customers Get There

Security operations shouldn’t be defined by burnout, backlog, and brittle tools. Torq HyperSOC replaces the slow, manual SOC model with an autonomous system powered by agentic AI, Hyperautomation, and seamless stack integration. In just 90 days with Torq, security teams move from reactive to proactive — automating Tier-1 triage, accelerating response, and freeing analysts to focus on what matters most.

Shai-Hulud: A Persistent Secret Leaking Campaign

On September 15, a new supply chain attack was identified that targeted the @ctrl/tinycolor and 150 other NPM packages. The attack scenario was similar to the one used in the s1ngularity and GhostActions campaigns. The threat actors combined a local environment secrets extraction with a malicious GitHub actions workflow injection in accessible projects. The compromised packages' structure has been detailed in blog posts by socket.dev and StepSecurity.

From Shadow IT to Shadow AI: The Evolution of Unseen Risk

Security leaders are well acquainted with Shadow IT; the unsanctioned apps, services, and even devices employees adopt to bypass bureaucracy and accelerate productivity. Think rogue cloud storage, messaging platforms, or unapproved SaaS tools. These all often slip past governance until they trigger a breach, compliance issue, or operational failure. Now, a more complex threat is emerging - Shadow AI.

Master regulatory compliance: Dominate change before it dominates you

In this article Change is no longer the exception; it’s the baseline. As we move into 2025, regulatory compliance is morphing faster than many organizations anticipated. New laws, shifting political priorities, disruptive technologies such as AI and IoT, and rising expectations from stakeholders are all combining to reshape what compliance looks like.

NPM Ecosystem Under Siege: Self-Propagating Malware Compromises 187 Packages in a Huge Supply Chain Attack

The NPM ecosystem has been rocked by one of its widest supply chain attacks to date, with over 187 popular packages compromised by advanced malware capable of self-propagation and automated credential harvesting. This attack, affecting packages with millions of weekly downloads including angulartics2, ngx-toastr, and @ctrl/tinycolor, demonstrates how cybercriminals are evolving their tactics to create “worm-like” malware that can autonomously spread across the software supply chain.

CrowdStrike Falcon Platform Evolves to Lead the Agentic Security Era

The enterprise is undergoing the most profound technological shift since the dawn of the internet. Artificial intelligence is no longer a side project or a productivity boost — it has become the new operating model for today’s businesses. Autonomous agents are reshaping how work gets done. Within the next year, nearly every organization will depend on them for competitive advantage. At the same time, adversaries are weaponizing AI to move at unprecedented speed and scale.

CrowdStrike Launches Agentic Security Workforce to Transform the SOC

AI has redrawn the cyber battlefield. Adversaries are already automating every phase of the kill chain to strike faster, scale wider, and overwhelm defenders. Manual workflows and conversational assistants help teams move faster, but still bind them to human speed. Agentic AI changes the equation. It enables security teams to deputize trusted, mission-ready agents that reason, decide, and act on their behalf — at the speed of AI. The promise of agentic AI is clear.