Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A 101 Guide to GDPR Vulnerability Assessment

The GDPR has compelled a shift in how companies manage personal data. At the heart of GDPR is the requirement to safeguard customer data from unauthorized access, loss, or alteration. GDPR vulnerability assessment is a basic requirement, whether you’re based in the EU or not. If you process the data of EU residents, this assessment isn’t optional.

What To Know About the Aflac Cyber Attack

Aflac, one of the largest American insurance companies, reported that cybercriminals breached its systems on June 20, 2025. Suspicious activity first occurred on Aflac’s U.S. network on June 12, and Aflac initiated its incident response plan to contain the spread of the cyber attack within several hours. At the time of this writing, Aflac’s investigation is still in the early stages, and the insurance giant hasn’t reported on how many of its customers were affected.

How to Prevent Phishing and Account Takeover from DNS Cache Poisoning in Real Time

For security teams, it’s no great revelation to say that DNS cache poisoning prevention is essential for guarding against attacks using that vector. But it’s easier said than done. While traditional network-layer defenses like DNSSEC reduce poisoning risk, they can’t fully prevent it. Downstream – after redirection – bad actors await, ready to harvest credentials, bypass MFA, and take over accounts.

How agentic AI could transform enterprise workflows: Insights from MIT GenAI Lab

The line between human and machine is blurring—and it’s not a question of whether machines can do more, but how far we’re willing to let them go. The frontier lies in tackling the chaos and solving the fragmented processes that slow enterprises: siloed rulebooks, scattered pricing spreadsheets, and manual approvals.

Trustwave SpiderLabs Investigates the Dark Web's Role in Supply Chain Attacks

One of the most dangerous aspects of the dark web is that it provides like-minded threat actors a haven to gather, discuss, develop, and sell access to technology companies, which are often the first link in a supply chain attack. Alternatively, it's an environment where those looking to enter the world of cybercrime and initiate a third-party attack can buy the tools necessary to begin their operation. Trustwave SpiderLabs report Technology Industry Deep Dive.

Omdia recommends Extended Access Management for shadow IT and AI

Omdia, a global analyst and advisory leader, recently released a report called “How Extended Access Management (XAM) closes the gaps in security.” The report argues that existing access management approaches have failed to adequately address the risks posed by unmanaged identities, applications, and devices.

Breaking the Intelligence Ceiling: CleanINTERNET® Horizon Changes Everything

Processing a million IOCs was once groundbreaking. Today, we’ve achieved something revolutionary: CleanINTERNET 6.0 Horizon. Our newest release of CleanINTERNET processes over ten billion IOCs with sextillion-range decisions per second at wire speed, that is 10x the previous capacity. Watch The Future of Your Defense to learn more about CleanINTERNET 6.0 Horizon This isn’t incremental improvement—it’s a complete reimagining.

CrowdStrike Falcon Wins AV-Comparatives Awards for EDR Detection and Mac Security

AV-Comparatives, an independent cybersecurity software testing organization, has released the results of two key evaluations of enterprise security solutions. The CrowdStrike Falcon cybersecurity platform achieved the EDR Detection Certification in AV-Comparatives’ inaugural 2025 EDR Detection Validation Test and the AV-Comparatives 2025 Mac Approved Security Award. This independent validation confirms the Falcon platform’s ability to stop breaches across the modern enterprise.

Airtel is strengthening security operations with Elastic's AI-driven analytics

In a previous blog post, we covered how Airtel’s (a leading telecommunications provider) managed security services (MSS), powered by Elastic Security, provide real-time threat detection, advanced analytics, and cloud security for enterprise customers. By using SIEM, endpoint protection, cloud security, and threat intelligence, Airtel enhances proactive threat hunting and incident response.