Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Tanium Software Inventory & Usage: The Key to Accurate Software Management

In today’s dynamic and complex digital landscape, organizations often find themselves grappling with software management challenges. Traditional methods of tracking software usage and licenses fail to deliver when the tools discover only a portion of endpoints in an environment or when reports take hours to run. In these cases, they ultimately produce inaccurate historical data that compromises decision making.

Runtime Security Tools: A Comprehensive Guide for 2025

While Cloud Security Posture Management (CSPM) and hardening are crucial security processes for maintaining a strong security posture, applications are most vulnerable during runtime, where unexpected threats can emerge. CSPM tools continuously scan cloud environments to detect misconfigurations, enforce compliance, and prioritize risks based on potential impact. However, runtime security becomes essential for addressing dynamic threats.

How does DORA impact UK entities: Key implications to consider

The Digital Operations Resilience Act (DORA) is a new regulation aimed at improving the cybersecurity and operational stability of the EU's financial sector, especially regarding risks related to information and communications technology (ICT). It applies to organizations in the financial industry, requiring them to reassess and adapt their security posture to DORA’s stringent requirements.

Advanced Ransomware Evasion Techniques in 2025

Ransomware has become more than a threat—it's a calculated assault on industries, wielding AI-driven precision to bypass traditional defenses. Attackers adapt faster than ever, turning cybersecurity into a high-stakes race where falling behind isn't an option. As we step into 2025, organizations face an urgent need to outthink and outmaneuver these evolving adversarial attacks.

Measuring the Effectiveness of Cyber Security GRC

‍Cyber security governance, risk, and compliance (GRC) programs are often viewed as cumbersome - a necessary yet costly component of doing business, providing very little value to the organization in terms of strategic impact. This narrow perception, unfortunately, limits the plethora of opportunities that a robust cyber security GRC framework would otherwise unlock.

How to spot job scams that leverage social engineering

From fake job postings to fake candidates, it’s clear the job market has changed in the past few years. Finding a job ad that sparks your interest is now only half the battle — the other half is making sure it’s not a scam. I see three or four LinkedIn posts about job searches and applications gone wrong every day. I’ve read tales of recruiter impersonations, postings for roles that don’t exist, and ads that demand money in order to apply.

Is Your AI App Safe? Analyzing Deepseek's Security Vulnerabilities

Artificial Intelligence is reshaping how we interact with technology, from virtual assistants to advanced search engines. However, with great power comes great responsibility—particularly when it comes to security. These apps often handle sensitive data, making them prime targets for cyberattacks. At Appknox, we're committed to ensuring that the latest AI applications are safe for users.

Helping civil society monitor cyber attacks with the CyberPeaceTracer and Cloudflare Email Security

Civil society organizations have always been at the forefront of humanitarian relief efforts, as well as safeguarding civil and human rights. These organizations play a large role in delivering services during crises, whether it is fighting climate change, support during natural disasters, providing health services to marginalized communities and more.

Phishing for Love: A Sharp Surge in Valentine's Day-Themed Scams

This Valentine’s Day, Cupid wasn’t the only one taking aim. Our Threat Research team noted a 34.8% increase on Valentine-related threat traffic in comparison to February of 2024. Leveraging impersonation and social engineering techniques, attackers have used a seasonal event to exploit heightened emotions and a sense of urgency, effectively increasing the likelihood of success in their phishing campaigns.

Web Application Penetration Testing

Web application penetration testing involves performing a simulated attack on a web app to determine weaknesses that hackers can exploit. The testing process uses emulations of real-world attacks to identify hidden attacks such as SQL injection, cross-site scripting (XSS), or cross-site request forgery (CSRF). What is the worst that could happen if you don’t continuously test your web application for vulnerabilities?