Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What You Need to Know about the Tea App Data Breach

Sean Cook created the tea app in November 2022. As a former product manager at Salesforce and Shutterfly, Sean self-funded the project, inspired by his mother’s negative experiences in the dating pool. The Tea app was designed to be a women-only platform vetting potential dates and providing AI-engineered gender verification. It has gained significant traction following viral popularity on TikTok and Reddit, amassing over 6 million users.

What you need to Know about the Allianz Life Data Breach

Allianz Life Insurance Company of North America is a large financial and retirement solutions provider. It specializes in investment items, annuities, and life insurance. Operating as a subsidiary of Allianz SE, a German multinational finance conglomerate, the company serves over 1.4 million people. Established in 1896, the firm was initially known as North American Casualty. It went through different acquisitions before being acquired by Allianz SE in 1979.

Introducing the Riscosity AI Firewall

AI is moving through enterprises faster than security teams can track. Over the past year, AI privacy incidents have risen 56%, and most of those stem from tools security never knew were in use. 84% of SaaS tools are purchased outside IT, and 62% of CISOs say fewer than a quarter of AI tools in use have been approved through procurement. That means sensitive, regulated, or confidential data is often flowing to AI services invisibly, sometimes across borders, without governance or guardrails.

How Banks and Financial Institutions Can Effectively Manage Third-Party Vendor Risks

While financial institutions enjoy many benefits from cooperating with third-party service providers, this cooperation also raises significant concerns regarding the security of the data and resources these vendors have access to. In this article, we discuss why financial institutions hire independent contractors and what cybersecurity risks this cooperation entails. We also explore how building a third-party vendor risk management program can help you mitigate these risks.

Supply Chains Under Siege: Inside the Cyber Threats on Manufacturing

In its 2025 State of the Underground report, Bitsight TRACE identified the manufacturing sector as the most targeted industry for the third consecutive year, accounting for 22% of the 4,853 cyberattacks where sector attribution was possible. Manufacturing is the backbone of global supply chains, and when a cyberattack halts operations, even just briefly, the ripple effects can be enormous. Production delays, missed shipments, and service disruptions quickly cascade across industries.

The Continuing Threat of Cyberattacks on Healthcare

The current trends in healthcare technology adoption present an interesting dynamic. Healthcare systems globally have been and continue to experience rapid digital transformation to the point where we now see increasingly embracing AI, internet-connected medical devices and telehealth solutions. Trustwave SpiderLabs captured what is taking place in its recent report Cybersecurity Challenges for Healthcare in 2025.

Cato CTRL Threat Research: Oyster Malware Loader Targets Tech-Savvy Users with Smarter Techniques During Summer Malvertising Campaign

Summertime in the U.S., Europe, and many other regions typically falls between June and September. Tech teams, admins, and even their bosses take vacations. Inboxes slow down, and production systems finally get a breather. But for the threat actors behind Oyster, while others were reaching for sunscreen or enjoying real sea fishing, they launched their own phishing campaign using something far more effective than email and sharpened their hook.

Oracle Kubernetes Engine Backup: A Complete Protection Plan

Oracle Kubernetes Engine backup requires a solid strategy that covers both applications and infrastructure. Oracle OKE handles orchestration well, but data protection remains your responsibility. A cluster failure or misconfigured setting can wipe out critical data and cause hours of downtime. This guide shows you how to build effective backup systems for your OKE environments.

Scattered Spider's New Telegram Channel: A Rapid Fire of Leaks, Claims and the Return of Cloud-era Data Thefts

In early August 2025 a new Telegram channel emerged presenting itself as an amalgam of three well-known cybercriminal labels Scattered Spider, ShinyHunters and LAPSUS$. Within 24 hours the channel published a steady stream of claims, partial data dumps and screenshots tied to a wide range of incidents, including retail and luxury brands, government entities, and cloud-platform related breaches. The channel’s activity revived public attention on several overlapping trends.

Bridging the Execution Gap in Cybersecurity: From Data to Decisions

Many cybersecurity teams today suffer from what experts call the execution gap—a disconnect between gathering intelligence and taking timely, effective action. Instead of empowering action, disconnected dashboards and alert overload often leave teams overwhelmed. To close this gap, industry must evolve from generating alerts to enabling decisions. The execution gap refers to the struggle teams face in turning overwhelming visibility and data into structured, prioritized response.