Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How's that for a malicious Linkc, new group launches DLS

2024 saw data-leak sites (DLSs) for 72 extortion groups materialise. As of February 2025, Cyjax has identified DLSs for five new groups, as noted in recent blogs on extortion groups Kraken, Morpheus, GD LockerSec, and Babuk2. The fifth one to emerge goes by the name Linkc. Read on to find out what Cyjax knows so far about this new entrant into the data leak extortion scene.

CIO POV: Five Essential Themes Shaping the CIO's Tech Agenda

Technology is rapidly redefining how we live and work. As CIO at CyberArk, I often get asked about the themes and realities shaping today’s tech agenda. Some of them—I’m looking at you, AI—are shiny and hyped, while others are familiar and fundamental yet equally important. Here’s a look at five on the top of my list.

BDRSuite vs Proxmox Backup Server: Which Backup Solution is Right for You?

When it comes to protecting your Proxmox virtualized environments, selecting the right backup solution is crucial for ensuring data integrity, minimizing downtime, and optimizing recovery efforts. BDRSuite’s Proxmox Backup and Proxmox Backup Server (PBS) both offer reliable Proxmox backup solutions, but each has its unique features and advantages tailored to different needs.

Data Gathering in Cybersecurity: Techniques, Best Practices, and Key Questions

In cybersecurity, the ability to gather, analyze, and act on data determines how well an organization can anticipate threats, detect vulnerabilities, and respond to attacks. But not all intelligence is created equal. Knowing what data to collect, where to find it, and how to interpret it is what separates reactive security teams from proactive ones.

Understanding Identity Threat Detection and Response

One of the largest data breaches of 2024 didn’t require advanced tactics, techniques, and procedures (TTPs), or an escalating chain of successful attacks. It simply required purchasing credentials on the dark web and using them to log in and steal data, once again highlighting the vital need for robust, proactive protection against the growing surge of identity-based attacks.

Dialer Service: Boost Efficiency with Automated Customer Outreach

If you've worked in customer service, sales, or any role where you reach out to people, you've probably thought: "There's gotta be a faster way to do this." Enter dialer services. These tools can save you time, reduce stress, and keep you from hurling your phone across the room.

Compliant until breached: The case for Digital Identity

If organizations are complying with their regulatory obligations, why are they still being breached? This obvious question exposes a paradox at the heart of everything we do in cybersecurity. It seems that the more we regulate, the more compliance requirements and frameworks we produce, and the more we nurture cybersecurity awareness, the more cyber incidents we face. What’s going on? Where’s the cause and where’s the effect?

How to Implement Zero Trust: A Step-by-Step Guide

Some traditional security methods are no match for evolving cyber threats, which is why zero trust is an essential addition to every organization’s arsenal. Unlike perimeter defenses, zero trust secures access at every level, verifying every device and user continuously to create a security posture that is far harder to penetrate. Gartner reports that 63% of organizations now use a zero trust strategy, a shift driven by the rising costs and frequency of successful breaches.

Trustwave Becomes First Pure-Play MDR Provider to Achieve FedRAMP Authorization

Trustwave has attained authorized status by the Federal Risk and Authorization Management Program (FedRAMP) for its Government Fusion platform. This announcement follows Trustwave being named last year as an official StateRAMP-authorized vendor. These achievements cap a multi-year journey through the FedRAMP process and make Trustwave the only pure-play Managed Detection and Response (MDR) provider recognized by FedRAMP.