Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Is That Gmail Security Alert Real? How to Spot a Phishing Scam

In a world where our lives are increasingly managed through email, an unexpected security alert can be a jarring experience. Recently, misinformation spread about a supposed mass security alert from Google, creating widespread panic. While Google has confirmed these claims are false, the incident serves as a powerful reminder of a constant threat: phishing scams. These fraudulent emails mimic real security warnings to trick you into giving away your personal information.

Next.js Vulnerability: The Critical Flaw of CVE-2025-29927 Explained

A critical vulnerability, identified as CVE-2025-29927, has shaken the Next.js development community. Rated with a severity score of 9.1 (Critical), this flaw allows attackers to completely bypass authorization checks in middleware, potentially granting unauthorized access to sensitive data and protected routes. The issue is a powerful reminder that even a small design flaw in a popular framework can have widespread and dangerous consequences.

SaaS Penetration Testing: How to Protect Tenants, APIs, and Critical Workflows

SaaS platforms power critical business processes such as HR, CRM, ERP, collaboration, and more. Their multi-tenant architecture, API-first design, and rapid release cycles make them uniquely vulnerable. A single vulnerability can compromise thousands of customers simultaneously. According to the Indusface State of Application Security – Global H1 2025, API attacks surged 104% YoY, with 13X more vulnerability exploits compared to websites.

Healthcare Penetration Testing: Protecting Patient Data, EHRs, Medical Devices, and APIs

The healthcare sector is one of the most targeted industries for cyberattacks. According to the Indusface State of Application Security H1 2025, exploit attempts on EMRs, test result dashboards, and online consultation platforms grew by 247%, highlighting the sector’s rising exposure. APIs and third-party integrations further expand the attack surface, giving adversaries more entry points to access sensitive patient data.

Penetration Testing for Insurance Firms: Boost Security, Compliance & Trust

Penetration testing for insurance firms has become a necessity as the sector faces a 309% surge in cyberattacks in H1 2025, compared to H1 2024. Attackers are no longer just after sensitive policyholder data; they are increasingly focused on disrupting core operations and undermining customer trust. With insurers handling massive volumes of personal and financial data, the stakes could not be higher. This heightened threat landscape makes penetration testing a necessity, not a checkbox.

The API Security Dilemma: Why Traditional Approaches Are Failing in the AI Era

Throughout the past few years, APIs have become the backbone of digital infrastructure. They enable software-to-software communication, improve integration and interoperability, support modular architecture, and more. But as API use has exploded, so has API traffic volume and complexity, making them increasingly difficult to secure. And the rise of AI agents and automation have complicated matters further. The result? APIs have become a favourite attack vector for cybercriminals.

Reflecting on Wallarm's Journey: Growth, Resilience, and What Comes Next

When we started Wallarm, we focused on the APIs that power modern apps. We built an API-first platform, used AI from day one, and secured early patents in behavior-based detection and automated policy creation. The result: real-time, inline blocking with automatic API discovery that protects production, not just dashboards. Today’s investment isn’t only fuel for innovation—it’s proof of enterprise recognition.

The Case of the Phantom Date: How a Single Pixel Fooled Our Visual AI

We’ve all seen it: a cutting-edge, multimodal LLM, capable of understanding complex documents, stumbles on a seemingly simple task. In our case, the model confidently reported a contract’s signing date as "March 30". The only problem? The document clearly stated "March 9th". It wasn't just a minor error; it was a baffling one that sent us down a rabbit hole of debugging.

Beyond Productivity - Using UAM to Understand Team Capacity & Burnout Risk

Burnout-related disengagement can cost organizations up to $21,000 per employee annually, or $5 million for a 1,000-person company. High workloads, digital fatigue, and constant multitasking are typical in modern workplaces. Many organizations struggle to recognize these signs early enough to act. Every day saved through proactive intervention helps recoup a portion of the $ 4,000–$ 21,000 per employee burnout risk.

Breach Risk Threat Monitoring: A Path to Clarity in Cyber Noise

The digital landscape is expanding at an unprecedented rate, driven by the mass migration to the cloud, the proliferation of IoT devices, and the rapid growth of AI. While this growth presents limitless opportunities, it also creates a daunting new reality for cybersecurity teams. As a company's digital footprint and attack surface expand, it becomes increasingly vulnerable to the growing number of threats, particularly those originating from the open, deep, and dark web.