Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Navigating DORA Compliance: A Roadmap to Operational Resilience with Trustwave

The Digital Operational Resilience Act (DORA) is poised to reshape the European financial landscape, demanding a robust defense against cyber threats and operational disruptions and Trustwave is putting the pedal to the metal to prepare clients with our DORA Readiness Accelerator service. The Trustwave DORA Readiness Accelerator, which joins Trustwave’s CMMC readiness and Microsoft Security accelerators, provides a structured approach to achieving compliance and bolstering operational resilience.

AI on your terms: introducing preferred AI providers in Tines

Leveraging AI is incredibly useful when orchestrating and automating your most important workflows. And it’s essential that you have the right AI model for your organization to handle those workflows as expected. Today, we’re excited to announce that you can select your preferred AI model when using AI in Tines products and features.

The Five Best Cloud Storage for Business Providers in 2025

Businesses are generating more data than ever, with 60% of company data being stored in the cloud, and businesses are storing 48% of their most important and sensitive data using some form of cloud storage. Even though businesses are using cloud storage, the risk of data breaches or attacks on company data is at the highest it's ever been, with 24% of breaches involving personal data and costing companies, on average, $4.88 million.

Ransomware Campaign Encrypting Amazon S3 Buckets using SSE-C

On January 13, 2025, Halcyon released a research blog about the Codefinger group conducting a ransomware campaign targeting Amazon S3 buckets. The attacks leverage AWS’s Server-Side Encryption with Customer Provided Keys (SSE-C) to encrypt data. The threat actors then demand ransom payments for the symmetric AES-256 keys required to decrypt it.

Impossible Travel Detection with Torq: Defend Against the Most Prominent and Expensive Breach

With widespread remote work and global access, organizations face mounting challenges in securing user identities against sophisticated threats. One critical identity risk signal is impossible travel, where a user appears to log in from two unrecognized, geographically distant locations within an unrealistic timeframe, indicating the possibility of compromised credentials or session hijacking.

Teleport 17

Teleport 17 marks our final major release of the year, bringing significant enhancements to our platform. In the six months since Teleport 16, we've not only developed this major release but also introduced several valuable features through minor and patch updates. A core theme for this release is scalable, secure, and resilient infrastructure access. This starts with our expanded focus on AWS Access. Teleport 17 includes preview support for AWS IAM Identity Center.

Teleport 17: A Game-Changer in Scalable, Secure, and Resilient Infrastructure Access

The explosive growth of computing infrastructure has ushered in a new era of complexity for engineering, infrastructure, and security teams. Managing access, identities, and policies across thousands—or even tens of thousands—of resources such as physical servers, multi-cloud platforms, and web apps is no small feat in itself.

Understanding ROPA: Who, What, Why?

ROPA is primarily utilized by organizations subject to data protection regulations. While it is a legal requirement for businesses of all sizes handling personal data, it is especially critical for large enterprises that process substantial volumes of data or sensitive information. Compliance officers, data protection officers (DPOs), legal teams, and IT departments often rely on ROPA to demonstrate compliance to regulators during audits or investigations.

Fake CAPTCHAs, Real Threats: How Lumma Stealer Tricks Users into Self-Inflicted Malware

SenseOn has detected a large increase in the Lumma Stealer malware targeting customers over the past few months. Unlike traditional malware strains, Lumma Stealer has been leveraging a unique, and increasingly effective, access vector of fake CAPTCHA verification prompts. These deceptive prompts trick users into running malicious commands on their device eventually injecting malicious processes into legitimate programs. This attack vector is expected to become even more prevalent throughout 2025.