Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Operation Phantom Circuit: North Korea's Global Data Exfiltration Campaign

In December 2024, a routine software update concealed a global threat. Attackers from the Lazarus Group, based in North Korea, infiltrated trusted development tools, compromising hundreds of victims worldwide. This sophisticated campaign, code-named “Phantom Circuit,” targeted cryptocurrency and technology developers, employing advanced obfuscation techniques through proxy servers in Hasan, Russia.

Unmasking Shadow AI: What Is it and How Can You Manage it?

Since the launch of ChatGPT in late 2022, gen AI (generative artificial intelligence) has transformed nearly every facet of our lives, including our professions and workplace environments. Adoption has been driven by employees looking for faster, better ways to perform. For example, applications like ChatGPT, DALL-E, and Jasper are helping employees across industries boost productivity, overcome roadblocks, and brainstorm creative solutions.

A Comprehensive Guide to Healthcare Cybersecurity

The healthcare industry faces a unique and urgent challenge in the ever-evolving world of cyber threats. As businesses across sectors fortify their digital defenses, healthcare stands out as a critical target due to its reliance on interconnected devices and vast repositories of sensitive patient data.

Achieving PSN Compliance: Why It Matters for Your Organisation

The PSN compliance certificate ensures organisations meet stringent security requirements, paving the way for improved operational integrity. Moreover, compliance can enhance organisational value, guiding strategic decisions and fostering a culture of accountability.

What Is Data Poisoning: Everything You Need To Know

Data poisoning is a type of attack targeting machine learning systems. It involves introducing false or misleading data into a training dataset. This can lead to flawed or malicious outputs from the model. Imagine a machine learning system trained to distinguish between cats and dogs. If poisoned data featuring mislabeled images is fed into it, the system could start making mistakes. It might misidentify a cat as a dog or vice versa.

Cloud security research and guide roundup: DevSecOps, threat detection, and AI

In Part 1 of our cloud security research and guide roundup, we looked at our contributions to helping you manage cloud infrastructure, data, identities, and access. In Part 2, we share our research, insights, and guides from Datadog Security Labs and The Monitor that support the NSA’s cloud mitigation strategies in the following areas: We’ll also go beyond these common strategies to look at how security plays a role in working with LLMs.

Top Fuzz Testing Tools of 2025: Feature Comparison

In 2025, fuzz testing has become an essential practice for ensuring software security and reliability. By identifying vulnerabilities through randomized input testing, fuzzing helps development teams uncover bugs that traditional testing methods—such as static analysis and penetration testing—often miss. With rapid advancements in security tools, let’s explore the top fuzz testing tools of 2025, their key features, benefits, and how they compare.

11:11 Systems Object Storage in Veeam Data Platform 12.3

With the 12.3 release of the Veeam Data Platform, integrating 11:11 Systems’ low-cost, Veeam-optimized Cloud Object Storage just got a whole lot easier. Now directly built into the Veeam UIs for both Backup & Replication and Veeam ONE, this integration gives you the best of both worlds—a seamless, streamlined setup and the unmatched efficiency of 11:11 Systems’ partnership with AWS S3.

Can You Really Block Bots with Robots.txt? The Truth Behind Bot Control

If you’re looking for a quick way to block bots with robots.txt, you may be disappointed to learn that it’s not as effective as many people think. Robots.txt is often discussed as a simple solution for controlling crawler traffic, but in reality, it provides very limited protection.