Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Europe Retail Threat Landscape 2024

As one of the world’s largest and most advanced economic regions, the European region consists of 37 countries including the 27 European Union (EU) countries. With some of the most important economies in the world, Europe remains a prime target for cyber adversaries and state actors. The retail industry faces a constantly evolving array of threats among its major sectors.

Strategies and Tradeoffs when Running AI Models on Lean Resources

This article explores the recommended infrastructure for AI workloads, strategies to optimize performance on less expensive servers, and trade-offs in terms of cost and results. We’ll also provide examples of AWS EC2 instance types and pricing to illustrate practical options.

Boost Cloud Security Without Bugging Your Developers

Developers are incredibly valuable to an organization’s progress and evolution. They must innovate quickly while simultaneously navigating changes to their day-to-day operations as companies heighten security requirements in the cloud. If developers find these security measures cumbersome, creating hurdles that plague their progress, they will likely bypass them altogether.

AP News - Feroot Research Uncovers DeepSeek's Connection to Chinese State-Owned Telecom

Researchers at Feroot Security have identified computer code within the web-based version of DeepSeek’s AI chatbot that could potentially send user login information to China Mobile, a Chinese state-owned telecommunications company. This discovery raises significant privacy and national security concerns, particularly as China Mobile has been barred from operating in the United States due to its alleged ties with the Chinese government and military.

Feroot Security Research Reveals DeepSeek AI's Hidden Data Pipeline to China

ABC Good Morning America featured an exclusive report this morning highlighting Feroot’s discovery of concerning code within DeepSeek’s AI platform. Feroot, a leading cybersecurity firm, uncovered hidden capabilities enabling direct data transmission from DeepSeek to China Mobile servers.

MySpace? Your security

In the early 2000s, one of the hardest choices many of us faced online was selecting our MySpace “Top 8” — the ultimate public display of friendship. Choosing which friends to feature required serious thought, some strategic prioritization, and let’s be honest — risking a few hurt feelings. I wonder if Tom still thinks about the impossible position he created for a generation of young internet users.

Nightfall Releases the 2025 State of Secrets Exposure Report

This year's report offers a look at what changed, what stayed the same, and where you can find a little hope in the quest for effective secrets management. While other reports focus on code repositories, Nightfall detects secrets across numerous mission critical SaaS apps and endpoints, giving a more comprehensive picture of leakage trends throughout the development lifecycle. We found secrets in ticketing apps, messaging and collaboration tools, cloud workspaces, and yes, code repositories.

INETCO recognized in the 2024 Gartner Market Guide for Fraud Detection in Banking Payments

The past year has been a journey of incredible growth and transformation at INETCO. From launching innovative product updates to expanding partnerships and earning recognition across the industry, we’ve taken huge strides toward transforming payments protection across the globe. 2024 was a year where milestones turned into momentum, preparing us to reach even greater heights in 2025.

Zero Trust Principles for Critical Infrastructure Security

The cyber threat to critical infrastructure has never been greater. The growing sophistication of cybercriminals, deteriorating geopolitical relations, and the convergence of operational technology (OT) and information technology (IT) have created unprecedented risks for critical infrastructure organizations. Fortunately, resources are available to help these organizations protect themselves.