Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

KnowBe4 Named a 2025 Gartner Peer Insights Customers' Choice for Email Security Platforms

KnowBe4 is excited to announce that we have been recognized as an overall Customers’ Choice in the July 2025 Gartner Peer Insights Voice of the Customer for Email Security Platforms Report. The Gartner Peer Insights Customers’ Choice distinction is based on feedback and ratings from end-user professionals who have experience purchasing, implementing and/or using a product or service.

What Are Insider Threats & How to Detect Them

Businesses spend a fortune to fight back against external threats, yet one of the most damaging cybersecurity risks is already inside the building. These are insider threats—security risks originating from the very people you trust with access to your network: your employees, contractors, and partners. This isn’t a rare occurrence but a consistent and growing trend.

What Is PCI DSS and How Can Organizations Best Maintain Compliance?

The world is going cashless. The Federal Reserve reported that cash was used in just 16% of all U.S. transactions in 2024. And that number is expected to continue to decline. The widespread use of credit and debit cards, plus the rise of digital wallets and contactless payments, have reshaped the financial landscape, increasing flexibility as well as financial protection. However, it’s also increased the levels of fraud.

Cybersecurity Training For Teachers Is Key To Stopping Phishing In Schools

Schools have become a prime target for cybercriminals, with phishing now the biggest threat. In fact, 89% of UK primary and secondary schools experienced a phishing attack last year, the Department for Science, Innovation & Technology reveals. 40% of higher education institutions also reported serious repercussions after phishing attacks, such as, data breaches or financial loss. So, what makes schools such attractive phishing targets? The answer lies in the fact that they often store a lot of sensitive data, but lack the IT resources to properly protect it. The good news is teachers do have the power to fight back against phishing.

ToolShell: Remote Code Execution in Microsoft SharePoint (CVE-2025-53770)

On July 19, 2025, a critical remote code execution (RCE) vulnerability (CVE-2025-53770, also referred to as ToolShell) was publicly disclosed, impacting on-premises Microsoft SharePoint Server installations. This vulnerability allows unauthenticated attackers to execute arbitrary code remotely by leveraging insecure deserialization techniques.

LLMs Are Not Goldfish: Why AI Memory Poses a Risk to Your Sensitive Data

We’ve all heard the myth: goldfish have a memory span of just a few seconds. While that’s debatable in marine biology circles, it’s useful as a metaphor in tech, especially when talking about memory, risk, and AI. The problem is, large language models (LLMs) are not goldfish. In fact, they have incredible memory. And increasingly, that memory isn’t just session-based. It’s persistent, long-term, and system-connected. That changes everything.

How Can You Use the Dow Jones Chart to Understand Market Trends?

Dow Jones' chart is an excellent graphical resource that can convert intricate market information into understandable trends and patterns. The market performance chart offers investors immediate responses to what the market has achieved over different periods and is therefore a key element of effective investment strategy. Possessing reading and interpreting skills of such charts can significantly help your ability to invest wisely and discover potential market opportunities.

Third-party risk is everyone's problem: What CISOs need to know now

In this article The alarm wasn’t a breach. It was an invoice. A mid-sized enterprise onboarding a new analytics vendor found themselves tangled in a post-implementation scramble: customer data had been shared without encryption, the vendor’s security posture was based on trust alone, and legal had skipped the SLA review because “they’d worked with them before.” What followed wasn’t a data loss, but something quieter and more corrosive, an erosion of confidence.

xonPlus Launches Real-Time Breach Alerting Platform for Enterprise Credential Exposure

xonPlus, a real-time digital risk alerting system, officially launches today to help security teams detect credential exposures before attackers exploit them. The platform detects data breaches and alerts teams and systems to respond instantly. Built by the team behind XposedOrNot, an open-source breach detection tool used by thousands, xonPlus gives organizations instant visibility when their email addresses or domains appear in breach dumps or dark web forums.

What Is AI Penetration Testing? A Guide to Autonomous Security Testing

AI penetration testing is changing how organizations identify and exploit vulnerabilities. Instead of relying on traditional manual tests or basic automated scans, autonomous systems now simulate attacker behavior continuously and at scale. These systems use agentic AI to execute real-world exploits, reduce noise, and shift security left, all while keeping human experts focused on the creative flaws machines can’t yet catch.