Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

WP.29 and Beyond: Global Trends in Automotive IoT Cybersecurity 2025

The automotive industry is undergoing a historic transformation. As vehicles become increasingly connected, autonomous, and software-defined—including the rise of connected cars, autonomous vehicles, and advanced driver assistance systems—cybersecurity has shifted from a technical afterthought to a regulatory requirement. At the heart of this transformation lies UN Regulation No.

Master export control regulations for 2025: Effortless compliance strategies

When considering the interconnected global economy, navigating export control regulations is more critical than ever for businesses involved in international trade. These regulations are designed to protect national security, support foreign policy objectives, and prevent sensitive technologies from falling into the wrong hands. However, the increasing complexity of these rules, combined with evolving geopolitical landscapes, can make compliance challenging.

AI-Generated Attacks: What are They and How to Avoid Them?

AI-generated attacks, such as social engineering, phishing, deepfakes, malicious GPTs, data poisoning, and more, are disrupting the current security landscape speedily. But there are ways to avoid them and strengthen our defences with miniOrange IAM solutions.

AI Adoption Is Outpacing Governance: Conversations on Managing AI Risk

Executives everywhere are under pressure to deploy AI fast — but our recent roundtable on AI risk, hosted by TEISS, revealed a growing concern: AI adoption is outpacing governance, and organisations are taking on more risk than they realise. While most enterprises have mature technical controls, many are missing visibility into how AI is being used — and by whom.

Rethinking Passwords to Build a Cyber Strong Tomorrow

The reality is clear: passwords remain one of the most-targeted—and most vulnerable—gateways into business IT environments. As cyber threats increase and evolve, relying on outdated password practices simply isn’t enough anymore. This Cybersecurity Awareness Month, let’s modernize our approach and treat password security not as a checkbox, but as a cornerstone of effective cyber resilience.

Faster, Smarter, Autonomous: Cloud Security with Wiz + Torq

Torq AMP spotlights the partners redefining what’s possible in security operations. Each partner brings a unique strength that seamlessly extends Torq’s autonomous SOC platform. Together, these partnerships help SOC teams achieve speed, accuracy, and scale that were once out of reach. Explore the future of SOC in the AMP’d Sessions video series. Cloud has changed everything: how we build, how we deploy, and how attackers strike.

Advanced Banking Trojan Maverick Uses WhatsApp to Prey on Brazilian Users

The BlueVoyant Security Operations Center (SOC) and Threat Fusion Cell (TFC) researchers recently analyzed attacks of an adversary targeting users based in Brazil via WhatsApp. The attack lures users into downloading a zip archive. The zip archive contains a shortcut file (.lnk) which ultimately downloads and executes a banking trojan which BlueVoyant researchers have dubbed Maverick internally based off the naming convention used by the attackers.

Red Hat Targeted in Massive Data Leak After Scattered LAPSUS$ Hunters Joins Forces with Crimson Collective

Researchers at Foresiet are actively investigating a major data leak targeting Red Hat, following claims made by Scattered LAPSUS$ Hunters, who have reportedly joined forces with the Crimson Collective, following claims made by the Scattered LAPSUS$ Hunters, who have reportedly teamed up with the Crimson Collective.