Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SafeBreach Coverage for US CERT AA25-050A [Ghost (Cringe) Ransomware]

On February 19, 2025, the Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) released a joint advisory to disseminate known Ghost (Cring)—(“Ghost”)—ransomware IOCs and TTPs identified through FBI investigation as recently as January 2025. Detailed information about this threat and the associated IOCs and TTPs can be seen in the advisory: Ghost (Cring) Ransomware.

Subdomain takeover: 12 Ways to Prevent this Attack

Subdomain takeovers don’t happen because attackers are geniuses. They happen because DNS records get messy. It’s not exactly an exciting gig to track old services or clean up unused subdomains, but ignoring it creates a security hole you can’t afford. Microsoft discovered over 670 vulnerable subdomains in a single audit. On a larger scale, 21% of DNS records out there lead to unresolved content, and 63% of those throw ‘404 not found’ errors.

Best DevSecOps Tools for Application Security in 2025

Building secure applications is about more than just adding security features at the end of the development process. It’s about addressing vulnerabilities and threats as they arise and improving security continuously—right from the start. That’s the power of DevSecOps.

Zenity Recognized in Gartner AI TRiSM Market Guide

Innovation, specifically the evolution of technology, has always been about expanding what’s possible or simplifying today’s complexity – sometimes both. We saw this with the internet revolution, adoption of cloud computing, remote working, low-code/no-code, and now AI is fundamentally reshaping how teams operate. While these advancements bring opportunities for organizations and push people’s creativity to new limits, they also introduce new risks.

DORA: Strengthening Digital Resilience Through API Security

The Digital Operational Resilience Act (DORA) is one of the most significant cybersecurity regulations for financial institutions in the European Union (EU). Failure to comply can have massive consequences, including financial penalties and forced operational downtime, meaning achieving DORA compliance should be a priority for all EU financial institutions. Implementing a comprehensive API security strategy goes a long way toward ensuring compliance with DORA requirements.

Cloud Storage With Zero Knowledge Encryption: Which One is The Best?

If you’re considering a private storage solution for your files online, you may have heard the term zero-knowledge encryption (ZKE). ZKE stands out from other cloud providers because it emphasizes privacy. By choosing cloud storage with zero-knowledge encryption, you are given full control over the security and privacy of your files, and you will protect them from companies like Google, who use your data for profit or to train their AI models.