Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI Risk Management: Defining, Measuring, & Mitigating the Risks of AI

‍ Artificial intelligence (AI) used to be something that only existed in science fiction novels and dystopian movies. Then, technology advanced, and it became a reality, being slowly implemented into experimental projects and niche use cases. Now, however, it is shaping real business outcomes, accelerating decisions and automating processes in ways that are becoming commonplace in daily market operations. ‍

CVE-2025-9242: Critical Unauthenticated Out-of-Bounds Write Vulnerability in WatchGuard Firebox

On September 17, 2025, WatchGuard released fixes for a critical out-of-bounds write vulnerability (CVE-2025-9242) in the iked process of WatchGuard Fireware OS, which powers their Firebox firewall appliances. This flaw allows a remote unauthenticated threat actor to execute arbitrary code and affects both the mobile user VPN with IKEv2 and the branch office VPN with IKEv2 when configured with a dynamic gateway peer.

SonicWall Warns Customers of Data Exposure Incident Affecting MySonicWall Configuration Backup Files

On September 17, 2025, SonicWall released a knowledge base article detailing the exposure of firewall configuration backup files stored in certain MySonicWall accounts. SonicWall states that after identifying the incident they began an investigation containing the incident, terminating the ‘unauthorized access point’, and working with law enforcement and select cybersecurity agencies globally.

Your Margins Are Under Attack. Here's How to Fight Back.

MSSPs don’t succeed because of the vendors they choose or the SIEM they prefer. They succeed when their operating model scales profitably. Yet most industry content feels like sales brochures, comparing one tool to another. The truth is, successful providers use many combinations of vendors. What separates winners from losers isn’t which tools they pick, it’s the foundation they build on.

Why Should You Use Fidelis Halo to Secure Containers in Hybrid Cloud and DevOps Pipelines?

Containerized applications have become the backbone of modern digital services. They allow you to package applications and dependencies into portable units that can run anywhere—on-premises, in private clouds, or across public cloud platforms. But with this agility comes risk. Containers, like any other software, are prone to vulnerabilities.

Beyond Perimeters: How Modern Endpoint DLP Addresses Today's Data Exfiltration Reality

The traditional network perimeter is dead. Your sensitive data now travels paths that legacy DLP solutions can't see—from Salesforce to Google Drive, across laptops, into personal Dropbox accounts, and through AI chatbots. No single traditional DLP catches all of this. We're at a turning point where shadow AI and rapid data movements expose blind spots that legacy solutions simply can't address. The reality?

Beware the Sandworm: The Shai-Hulud Attack Explained

A new and dangerous self-replicating worm has been identified targeting the JavaScript repository NPM, infecting at least 187 code packages. The novel malware strain is engineered to steal credentials from developers and publish them to a new public GitHub repository. The worm automatically propagates itself by copying its code into the top 20 most popular packages maintained by the compromised user and publishing them as new versions.

Proving DORA Requirements with the SafeBreach Platform

Complying with the Digital Operational Resilience Act (DORA) means proving that resilience is built into daily operations through ongoing, evidence-backed practices. SafeBreach, the leader in enterprise exposure validation, helps institutions meet DORA’s key requirements by simulating real-world threats across the MITRE ATT&CK framework.