Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The AI Revolution: Embracing the Future of eDiscovery

The eDiscovery landscape is undergoing a profound transformation, driven by the rapid evolution of artificial intelligence (AI). What was once a labor-intensive, manual process is now being revolutionized by technologies capable of analyzing vast volumes of data with speed, precision and insight. AI is not just a buzzword; it’s a catalyst for smarter, faster and more defensible legal workflows.

Critical Vulnerability Alert: CVE-2025-61882 in Oracle E-Business Suite

A critical vulnerability (CVE-2025-61882) has been identified in Oracle E-Business Suite, specifically impacting the Concurrent Processing component through its BI Publisher Integration. This widely used enterprise resource planning platform is deployed across finance, HR, procurement, and other critical business functions, making any compromise potentially devastating.

AI agents in financial services: The hidden org chart

AI agents are quickly becoming “first-class citizens” in financial services, mimicking human behavior and holding privileged access that rivals employees. Yet unlike people, they don’t appear on your official org chart. The financial services sector already lives in a state of constant tension: the race to adopt new technologies for a competitive edge often faces off with the duty to preserve customer trust earned over decades of reliability, regulation, and security.

CVE-2025-61882: New Critical RCE Vulnerability Linked to Oracle E-Business Cl0p Extortion Emails

On October 4, 2025, Oracle released a fix for a newly disclosed critical vulnerability, tracked as CVE-2025-61882, linked to recent extortion emails received by some Oracle E-Business Suite (EBS) customers. This vulnerability allows unauthenticated remote threat actors to achieve remote code execution and resides in the BI Publisher component of Oracle Concurrent Processing.

Security Leaders Cite AI-Driven Phishing Attacks as a Top Concern

A new report has found that nearly 40% of security leaders believe their organizations are least prepared for phishing and other social engineering attacks, Help Net Security reports. According to the report from VikingCloud, these concerns are driven by the increasing use of AI tools to assist in cyberattacks. “Generative or agentic AI-driven phishing attacks (51%) are leadership teams’ top concern when it comes to new cyberattack techniques,” the report says.

Spec Reviews Slowing You Down? Meet the AI Tool That Turns PDFs Into Project-Ready Insights

Almost every AEC professional interacts with construction specifications from estimating to closeout, but that doesn’t mean it's easy. Locked in hard-to-use PDFs, specification documents are often a time-consuming obstacle. Egnyte’s Specifications Analyst, part of the new Project Hub, eases the pain with an intuitive interface built specifically for how AEC teams work.

From endpoint to XDR: Operationalize Jamf Protect data in Elastic Security

Enhance your threat detection, investigation, and response capabilities by integrating Jamf Protect macOS data within Elastic Security. Security teams often struggle to detect and respond to macOS threats with endpoint data alone. The integration with Jamf Protect changes that. Jamf Protect delivers rich macOS telemetry and built-in protections like Threat Prevention and Network Protection, powered by Jamf Threat Labs.

Manufacturing: Executives Voice Cyberattack Readiness Concerns

Manufacturing executives recently surveyed by LevelBlue expressed a deep concern that emerging attack methods, such as deepfakes and AI-powered attacks, will be almost as likely as more traditional attacks like ransomware. We derived the information from a research-based survey conducted in January 2025, which included 220 C-suite and senior manufacturing executives.

How Graylog Helps You Spot LockBit-Style Attacks Sooner

The DFIR Report recently detailed a LockBit attack with ransomware intrusion that succeeded without advanced exploits or zero-day vulnerabilities. The attack relied on a stolen AnyDesk installer, credential reuse, and renamed PowerShell scripts that blended into routine activity. These moves were not sophisticated, but they were fast and effective. The end result: complete domain encryption.