Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SquareX Shows AI Browsers Fall Prey to OAuth Attacks, Malware Downloads and Malicious Link Distribution

As AI Browsers rapidly gain adoption across enterprises, SquareX has released critical security research exposing major vulnerabilities that could allow attackers to exploit AI Browsers to exfiltrate sensitive data, distribute malware and gain unauthorized access to enterprise SaaS apps. The timing of this disclosure is particularly significant as major companies including OpenAI, Microsoft, Google and The Browser Company have announced or released their own AI browsers. With Chrome and Edge alone representing 70% of the browser market share, it is very likely that the majority of consumer browsers in the future will be AI Browsers.

Powerful change management policy: Expert best practices for seamless adaptation

Considering the fast-moving business world we live in, change is inevitable and the organizations that thrive are those that manage it deliberately, confidently and with purpose. A well-crafted change-management policy doesn’t just set rules; it empowers teams, reinforces strategic goals and keeps operations fluid during transformation. Whether you’re upgrading systems, migrating workflows or shifting culture, the right policy serves as a guiding backbone.

Best Vulnerability Management Platforms MSSP Buyer's Guide

Cybercriminals are not waiting around; they are exploiting vulnerabilities faster than ever. According to the 2025 Verizon Data Breach Investigations Report (DBIR), vulnerability exploitation accounted for 20% of breaches, marking a 34% jump from last year. This sharp rise highlights a hard truth: leaving security gaps unaddressed is an open invitation to attackers.

Penetration Testing for Financial Services: Meeting Compliance and Security Benchmarks

The financial sector has always been a prime target for attackers, but the scale and sophistication of threats have grown exponentially. In just the first half of 2025, over 742 million attacks were recorded across more than 600 global banking and financial services (BFS) sites, averaging 1.2 million attacks per site, a 51% increase compared to the same period in 2024.

The FFIEC retired CAT-here's why financial institutions are turning to CRI

When the Federal Financial Institutions Examination Council (FFIEC) released its Cybersecurity Assessment Tool (CAT) in 2015, it became the industry standard for evaluating cyber readiness. ‍ A decade later, the threat landscape has evolved—and rather than updating the CAT, the FFIEC retired it on August 31, 2025. With CAT no longer the industry's best practice, many financial institutions are asking: What’s next? ‍

CurrentWare v11.0.2 - SIEM Integration, Cost Summary, Idle Exclusion list,and More

CurrentWare version 11.0.2 is here! This update introduces SIEM integration, Workforce Cost Summary to quantify the cost of underutilized employees, Idle Exclusion List to ensure more accurate employee productivity analytics, alert templates to simplify the alert creation process, the ability to block Bluetooth file transfers while allowing Bluetooth audio, and several security fixes based on penetration testing by third-party security consultants. Need help upgrading?

Android Zero Touch Enrollment (ZTE) - An Overview

Imagine a company ordering new Android phones for their sales team. Without the right management solution in place, the IT team would spend hours (sometimes days) unboxing each phone, setting it up, downloading company apps, and repeating the same steps over and over again. The risk? delayed device rollouts and wasted time and energy.

New Era of Crypto Security: Meet Fireblocks Security Posture Management

In traditional cybersecurity, Security Posture Management (SPM) is an essential discipline. Organizations routinely monitor their cloud configurations, SaaS applications, and infrastructure for misconfigurations and vulnerabilities that could expose them to threats. It’s a recognition of a fundamental truth that even the most sophisticated security systems are only as strong as they’re configured to be.

Empower your team: Ultimate guide to employee IS issue response

Even the best-prepared teams can stumble when an information security (IS) issue surfaces; the real risk isn’t just the incident itself, but how quickly and clearly your employees know what to do next. When an alert goes off, every second counts: Who do they call? Which system do they isolate? What’s the escalation path? Without a well-defined, practiced response plan, confusion can spread faster than the threat.