Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Are Your VPNs and NACs Secretly Sabotaging Your Security?

For many, the answer still involves legacy VPNs and Network Access Control (NAC), familiar tools from a different era. But what if those trusted systems aren’t protecting you anymore, and are instead becoming some of your biggest liabilities? To explore this shift, Netskope partnered with Cybersecurity Insiders, a leading research platform for CISOs and cybersecurity professionals, to dig into the real risks of relying on outdated access solutions.

When "Secure by Design" Isn't Enough: A Blind Spot in Power Platform Security Access Controls

Security Groups play a pivotal role in tenant governance across platforms like Entra, Power Platform, and SharePoint. They allow administrators to control access, enforce identity-aware security, and prevent unauthorized interactions. However, we’ve identified a security group bypass risk: Application Users (App Users) - Service Principal identities from Entra - can slip past Security Group restrictions, creating misaligned identity assumptions and enabling unauthorized data access.

Navigating the Noise: Separating Security Reality from Hype

In the cybersecurity landscape, sensational headlines and alarming vulnerability disclosures are commonplace. Recent events have been a whirlwind, with claims of massive data breaches and widespread vulnerabilities affecting critical infrastructure. From the overstated impact of Next.js middleware vulnerabilities to the exaggerated reach of Nginx ingress issues, it's clear that the cybersecurity community needs a reality check.

5 Critical Security Risks Facing COBOL Mainframes

COBOL remains deeply embedded in the infrastructure of global enterprises, powering critical systems in banking, insurance, government, and beyond. While its stability and processing efficiency are unmatched, legacy environments running COBOL face a growing challenge: Security. As cyber threats evolve and legacy systems continue to age, COBOL-based mainframes present attractive targets due to their outdated configurations, minimal security oversight, and lack of modern defenses.

Third-Party Breaches: Why You Should be Prioritizing Supply Chain Cyber Risk Today

Look at any collection of top 10 organizational security concerns from recent years, and “third-party breaches” are consistently high on the list. These attacks have caused financial and reputational damage to every sector, from banks to healthcare systems to retail to governments. And the problem is growing. Recent statistics highlight just how severe the issue has become.

CVE-2024-58248: Race condition vulnerability leaves nopCommerce at risk of single-packet attacks

I recently discovered an interesting race condition vulnerability in the eCommerce software nopCommerce, during a manual pen test as part of the SWAT service (SWAT is Outpost24’s Pen Testing as a Service solution). This vulnerability (CVE-2024-58248) involves nopCommerce, an open-source eCommerce platform written in C#, which aids developers in building online stores. When exploited, it allows an attacker user to redeem a gift card multiple times by using a technique called a single-packet attack.

How hacktivist cyber operations surged amid Israeli-Iranian conflict

In June 2025, Israel carried out airstrikes against key Iranian military and nuclear facilities. Iran swiftly retaliated, escalating regional tensions to unprecedented levels. This military confrontation has not only unfolded in conventional warfare but also triggered a massive surge in cyber operations. Almost immediately after the kinetic attacks, numerous hacktivist groups began launching cyberattacks primarily targeting Israel and its international allies.

Content Independence Day: no AI crawl without compensation!

Almost 30 years ago, two graduate students at Stanford University — Larry Page and Sergey Brin — began working on a research project they called Backrub. That, of course, was the project that resulted in Google. But also something more: it created the business model for the web. The deal that Google made with content creators was simple: let us copy your content for search, and we'll send you traffic.

What's new in Tines: June 2025 edition

Did you hear the news? You can now build and deploy agents in Tines using the AI Agent action type - an evolution of our AI action! AI on the Storyboard just got even more powerful, with the opportunity to build your workflows as autonomous as you choose with the help of an agent. Using the tools from your tech stack, the agents you build are designed to reason, decide, and act on your behalf. Curious to see it in action?