Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Guarding open-source AI: Key takeaways from DeepSeek's security breach

In January 2025, within just a week of its global release, DeepSeek faced a wave of sophisticated cyberattacks. Organizations building open-source AI models and platforms are now rethinking their security strategies as they witness the unfolding consequences of DeepSeek’s vulnerabilities. The attack involved well-organized jailbreaking and DDoS assaults, according to security researchers, revealing just how quickly open platforms can be targeted.

Gcore Radar report reveals 56% year-on-year increase in DDoS attacks

Gcore, the global edge AI, cloud, network, and security solutions provider, today announced the findings of its Q3-Q4 2024 Radar report into DDoS attack trends. DDoS attacks have reached unprecedented scale and disruption in 2024, and businesses need to act fast to protect themselves from this evolving threat. The report reveals a significant escalation in the total number of DDoS attacks and their magnitude, measured in terabits per second (Tbps).

What is a man in the middle attack? Definition & examples

A Man-in-the-Middle (MitM) attack occurs when a cybercriminal secretly intercepts and manipulates communications between two parties who believe they are interacting directly. It is currently one of the most deceptive and dangerous cyber threats. Such attacks often lead to data theft, unauthorized access and compromised privacy, to name a few consequences.

A Phased Approach: Thoughts on EU AI Act Readiness

The European Union’s (EU) AI Act (the Act) represents landmark artificial intelligence (AI) regulation from the EU designed to promote trustworthy AI by focusing on the impacts on people through required mitigation of potential risks to health, safety and fundamental rights. The Act introduces a comprehensive and often complex framework for the development, deployment and use of AI systems, impacting a wide range of businesses across the globe.

Cyber and Physical Security Considerations for Returning to the Office

When remote work became mandatory in the wake of the 2020 COVID pandemic, organizations had to quickly dispatch staffers to their homes with all the equipment, and services, they would need to do their jobs. However, as organizations ranging from the US government to JP Morgan Chase to Amazon, have all put out a call for their workers to return to the office, security issues will again become paramount.

Privacy Enhancing Technologies (PETs): Data Protection Meets Innovation

The data protection law does not define PETs; however, The European Union Agency for Cybersecurity (ENISA) refers to PETs as: ‘software and hardware solutions, i.e. systems encompassing technical processes, methods or knowledge to achieve specific privacy or data protection functionality or to protect against risks of privacy of an individual or a group of natural persons.’1 In simple terms, they are strategies and tools designed at safeguarding privacy and empowering individuals.

Comprehensive PowerShell Commenting Guide

If you write Windows PowerShell scripts, it’s important to understand how to use PowerShell comments effectively. This article can help. It explains the key ways you can include comments in your scripts and provides guidance for when to use each method. It also explains popular use cases for comments and offers best practices to follow and common mistakes to avoid.

Introducing Workflows: Automate Security Alerting While Staying Focused on Real Risks

Security teams and developers are drowning in product security alerts. Every security scan generates a flood of issues, and manually reviewing, prioritizing, and assigning each one is time-consuming and inefficient. The result? Critical risks get buried in long backlogs, while developers waste time chasing issues that don’t actually introduce real risk.