Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Xalient appoints Andrew Critchley to accelerate Identity Strategy and Global Identity Managed Services

Xalient announces the appointment of Andrew Critchley as Head of UK Identity Practice and Global Identity Managed Services. Andrew is a recognized IAM Subject Matter Expert with a strong track record in developing and scaling identity services across global enterprises.

Unmanaged IoT Device Security: The Hidden Cybersecurity Risk Enterprises Can't Ignore

The rapid expansion of the Internet of Things (IoT) has fundamentally changed how organizations operate, enabling smarter, more connected enterprise networks. IoT devices—ranging from security cameras and smart TVs to advanced medical devices—are now embedded in nearly every aspect of business operations. These devices help organizations streamline processes, enhance productivity, and improve the management of critical systems.

Is That Gmail Security Alert Real? How to Spot a Phishing Scam

In a world where our lives are increasingly managed through email, an unexpected security alert can be a jarring experience. Recently, misinformation spread about a supposed mass security alert from Google, creating widespread panic. While Google has confirmed these claims are false, the incident serves as a powerful reminder of a constant threat: phishing scams. These fraudulent emails mimic real security warnings to trick you into giving away your personal information.

Next.js Vulnerability: The Critical Flaw of CVE-2025-29927 Explained

A critical vulnerability, identified as CVE-2025-29927, has shaken the Next.js development community. Rated with a severity score of 9.1 (Critical), this flaw allows attackers to completely bypass authorization checks in middleware, potentially granting unauthorized access to sensitive data and protected routes. The issue is a powerful reminder that even a small design flaw in a popular framework can have widespread and dangerous consequences.

SaaS Penetration Testing: How to Protect Tenants, APIs, and Critical Workflows

SaaS platforms power critical business processes such as HR, CRM, ERP, collaboration, and more. Their multi-tenant architecture, API-first design, and rapid release cycles make them uniquely vulnerable. A single vulnerability can compromise thousands of customers simultaneously. According to the Indusface State of Application Security – Global H1 2025, API attacks surged 104% YoY, with 13X more vulnerability exploits compared to websites.

Healthcare Penetration Testing: Protecting Patient Data, EHRs, Medical Devices, and APIs

The healthcare sector is one of the most targeted industries for cyberattacks. According to the Indusface State of Application Security H1 2025, exploit attempts on EMRs, test result dashboards, and online consultation platforms grew by 247%, highlighting the sector’s rising exposure. APIs and third-party integrations further expand the attack surface, giving adversaries more entry points to access sensitive patient data.

Penetration Testing for Insurance Firms: Boost Security, Compliance & Trust

Penetration testing for insurance firms has become a necessity as the sector faces a 309% surge in cyberattacks in H1 2025, compared to H1 2024. Attackers are no longer just after sensitive policyholder data; they are increasingly focused on disrupting core operations and undermining customer trust. With insurers handling massive volumes of personal and financial data, the stakes could not be higher. This heightened threat landscape makes penetration testing a necessity, not a checkbox.

The API Security Dilemma: Why Traditional Approaches Are Failing in the AI Era

Throughout the past few years, APIs have become the backbone of digital infrastructure. They enable software-to-software communication, improve integration and interoperability, support modular architecture, and more. But as API use has exploded, so has API traffic volume and complexity, making them increasingly difficult to secure. And the rise of AI agents and automation have complicated matters further. The result? APIs have become a favourite attack vector for cybercriminals.

Reflecting on Wallarm's Journey: Growth, Resilience, and What Comes Next

When we started Wallarm, we focused on the APIs that power modern apps. We built an API-first platform, used AI from day one, and secured early patents in behavior-based detection and automated policy creation. The result: real-time, inline blocking with automatic API discovery that protects production, not just dashboards. Today’s investment isn’t only fuel for innovation—it’s proof of enterprise recognition.