Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The Quiet Data Leak from GenAI

Like me, I’m sure you’re keeping an open mind about how Generative AI (GenAI) is transforming companies. It’s not only revolutionizing the way industries operate, GenAI is also training on every byte and bit of information available to build itself into the critical components of business operations. However, this change comes with an often-overlooked risk: the quiet leak of organizational data into AI models.

Top 7 Enterprise Fraud Management (EFM) Solutions

Today, fraud schemes don’t follow predictable patterns. Enterprises are up against AI-generated deepfake attacks, multi-stage social engineering, and impersonation scams that exploit gaps in traditional fraud prevention strategies. And they know it. According to PwC, 59% of enterprises completed a fraud risk assessment in the 12 months prior to June 2024, showing they take fraud protection seriously. But beyond knowing your risks, there’s a need for better ways to tackle and mitigate them.

PoC Exploit Available for Critical Information Disclosure Vulnerabilities in Ivanti EPM

On February 19, 2025, Horizon3.ai published proof-of-concept (PoC) exploit code and technical details for critical Ivanti Endpoint Manager (EPM) vulnerabilities disclosed in January. The vulnerabilities are tracked as CVE-2024-10811, CVE-2024-13161, CVE-2024-13160, and CVE-2024-13159, allowing a remote unauthenticated attacker to leak sensitive information via a path traversal. They share the same underlying issue, which results from an unauthenticated endpoint failing to validate input.

The evolution of quality at Vanta

Vanta’s story began like many other startups—moving fast to discover product-market fit and lay the groundwork for a sustainable business. Speed was key as we focused on delivering value to customers and rapidly iterating to meet market needs. This approach propelled us into a phase of healthy growth, marked by milestones we proudly celebrate (read more about our recent achievements here).

Cybersecurity for Electricity Distribution [2025 Update]

Electricity transmission and distribution are popular topics at the moment, especially as they pertain to utilities infrastructure security. These essential pillars of modern society are undergoing rapid digital transformation, with increased connectivity and technological sophistication harboring large-scale cybersecurity challenges.

WatchGuard Recognized in CRN's Prestigious 2025 Security 100 List

Once again, WatchGuard has been named to CRN’s 2025 Security 100 list in the Network Security category. This prestigious recognition honors the top security vendors in the IT channel. The 2025 CRN Security 100 highlights channel-friendly cybersecurity vendors across a number of market segments, ranging from the largest and best-known players to some of the small-but-promising startups.

Achieving PCI DSS 4.0.1 Compliance for Companies (SAQ A-EP): A Comprehensive Guide for Feroot PCI PaymentGuard AI

Payment security for SAQ A-EP merchants has never been more critical. As e-commerce continues to evolve, merchants who control elements of their payment pages face increasing security challenges and compliance requirements.

3 Examples of Tokenization Initiatives Reshaping Financial Markets

Tokenization, or the process by which assets are converted into tokens that can be moved, stored, or recorded on a blockchain, enables a transparent, well-governed financial system. It empowers interested participants to utilize financial services and access capital markets with ease and efficiency. We’re currently seeing active examples of tokenization projects across multiple asset classes, such as commodities, debt securities, equity securities, and real estate.

Decrypting WalletConnect Messages: A Guide for Developers

Decentralised Finance (DeFi) is redefining the utility of financial services by opening up access to lending, trading, and yield generating without relying on traditional intermediaries. To execute on DeFi strategies, seamless wallet connectivity is essential. To make this possible, Fireblocks has integrated with WalletConnect. In this blog, we’ll outline how the team has approached investigating issues related to WalletConnect sessions.

What is the MITRE ATT&CK Framework?

The MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) framework was developed in 2013 to document the tactics and techniques used by adversaries in cyberattacks. Initially an internal tool for threat detection, it became publicly available in 2015 to support the cybersecurity community. Over time, it has evolved into a comprehensive resource that describes adversary behaviours during attacks.