Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

An Offensive Security Perspective on Hacking the Cloud: Five AWS and Azure Cloud Security Threats to Focus On

According to Gartner, the global market for cloud infrastructure services increased by 30% in 2022, exceeding $100 billion for the first time. AWS and Azure account for almost two-thirds of this figure. While many organizations benefit from these platforms, the popularity of the cloud can also present significant security challenges.

[Must Read] How Boeing Battled a Whopping $200M Ransomware Demand

Boeing recently confirmed that in October 2023, it fell victim to an attack by the LockBit ransomware gang, which disrupted some of its parts and distribution operations. The attackers demanded a whopping $200 million not to release the data they had exfiltrated. On Wednesday, Boeing admitted it was the company described as the "multinational aeronautical and defense corporation headquartered in Virginia" in a recently unsealed U.S. Department of Justice indictment.

Phishing-as-a-Service Platform LabHost Disrupted by Law Enforcement Crackdown

One of the largest phishing-as-a-service platforms, LabHost, was severely disrupted by law enforcement in 19 countries during a year-long operation that resulted in 37 arrests. According to a recent Europol announcement, the folks behind the LabHost Phishing as a Service (PhaaS) platform were arrested last month. In a coordinated search over three days, 37 suspects were apprehended, disrupting the well-known service.

Digital Doppelgängers: AI-Generated Celeb Fashion Takes Over the Met Gala on Social Media

The Met Gala, fashion's biggest night, was not just the A-list attendees who stole the spotlight—digital imposters in the form of AI-generated superstars sent social media into a frenzy. As the actual stars showcased their designer ensembles at the gala, X and other platforms were overrun with images of celebrities who were shown to be there, but they actually didn't attend. This new phenomenon has given rise to a online spectacle that is challenging the realms of reality and fantasy.

Empowering Governance in AI-Driven Citizen Development

AI is at the heart of technology democratization. As AI tools become more accessible, individuals and organizations have begun to utilize AI copilots to build their own apps, automations and increase productivity in their jobs. This transformation has come to be known as the next evolution of low-code and no-code development. This development promises to accelerate innovation, enhance productivity, and solve complex problems more efficiently than ever before.

Empowering Citizen Developers with Zenity's AI Tools

Empowering Citizen Developers: Using Zenity’s Tools in AI-Driven Development The ability to develop applications, automations, and bots without the need for custom coding, has resulted in a paradigm shift for cybersecurity. Now, more than ever, citizen developers can design and implement solutions without the need for a traditional coding background. Due to innovative tools and platforms, as well as the integration of AI, development is now faster, more accessible, and more efficient.

EP 52 - Built to Last: CyberArk's 25-Year Innovation Evolution w/ Founder and Executive Chairman Udi Mokady

In this episode of the Trust Issues podcast, host David Puner interviews CyberArk Founder and Executive Chairman Udi Mokady on the occasion of the company’s 25th anniversary. They discuss that milestone and reflect on CyberArk’s growth to becoming the global leader in identity security and the ever-evolving threat landscape – and how the company has scaled to meet it. Udi shares his insights on the company’s culture, values, philosophies and lessons he has learned.

CyberArk at 25: Udi Mokady on Milestones, Identity Security and Humility

Let’s head back for a moment to when some of us were partying like it’s 1999, in 1999. Among that year’s notable milestones were the release of The Matrix, the introduction of the euro – and the impending clock turn to 2000 (aka Y2K), which propelled prophylactic tech upgrades far and wide. Simpler times – at least in retrospect.

The dangers of enterprise attack surface expansion: Lessons from 5 major breaches

Enterprise attack surface expansion has become a focal point for IT security teams. The relentless pursuit of securing every endpoint and countering new threats with the latest technology is not just costly; it's also unsustainable. Despite these efforts, breaches continue to occur, often through new or unorthodox attack vectors that bypass traditional perimeter defenses.