Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Worsening Landscape of Educational Cybersecurity

Last year, KnowBe4's report "Exponential Growth in Cyber Attacks Against Higher Education Institutions" illustrated the growing cyber threats facing universities and colleges. The report highlighted the perfect storm of factors making educational institutions prime targets: vast data repositories, open networks, limited security resources, and decentralized governance structures.

New Unrestricted AI Tool Can Assist in Cybercrime

Researchers at Certo warn that a new AI chatbot called “Veniceai” can allow cybercriminals to easily generate phishing messages or malware code. The tool, which only costs $18 per month, is growing in popularity on criminal forums. “One of the starkest contrasts between Veniceai and more mainstream AI systems like ChatGPT is how each responds to harmful or malicious requests,” Certo says.

Introducing Salt Illuminate: API Security That Works in Minutes, Not Months

APIs are the backbone of modern business. They connect services, power user experiences, and enable innovation at breakneck speed. But they’ve also become one of the largest, most complex threat surfaces out there—and traditional security approaches just aren’t cutting it. At Salt Security, we’ve spent years pioneering API protection. And today, we’re thrilled to announce our biggest leap forward yet. Meet Salt Illuminate.

ConnectWise Breach Attributed to Nation-State Threat Actor

On May 28, 2025, ConnectWise published an advisory disclosing suspicious activity within its environment, attributed to a sophisticated nation-state threat actor known for intelligence collection. The activity reportedly affected a very small number of ScreenConnect customers, all of whom ConnectWise has directly contacted. Details remain limited as the investigation is ongoing.

OWASP API Cheat Sheet - From Developer Guidance to Executive Strategy

OWASP’s API Security Cheat Sheet is a familiar resource for many cybersecurity leaders—often bookmarked, rarely reimagined. But what if this seemingly developer-focused reference held the blueprint for executive-level strategy? For CISOs and CFOs operating in the era of digital ecosystems and financial APIs, this cheat sheet is not just tactical guidance—it’s strategic armor.

EU Regulating InfoSec: How Detectify helps achieving NIS 2 and DORA compliance

Navigating the complex and ever-changing compliance landscape is difficult for many companies and organizations. With many regulations, selecting the appropriate security tooling that aligns with the compliance needs of your business becomes a significant challenge.
Featured Post

Data Protection vs. Cyber Resilience: Mastering Both in a Complex IT Landscape

Today's always-on, hyperconnected world requires CIOs to confront two equally important concepts: data protection and cyber resilience. As reliance on data to fuel analytics, engineering, marketing, and other key operations increases, the complexity surrounding IT infrastructure grows in tandem. Hybrid workforces, edge computing, cloud-native applications, and legacy systems add further complexity to the mix.

Is Runtime Vulnerability Management the future of cyber risk management?

Traditional vulnerability management has hit a wall. The vulnerability management playbook hasn't changed much in decades: scan for CVEs, prioritize by CVSS scores and patch as quickly as possible. But this reactive approach is failing security teams who are drowning in alerts while real threats slip through the cracks. Runtime vulnerability management sets out to change this status quo. Here's what you need to know.

Search-Safe: Why SEO Should Be Part of Your Cybersecurity Toolkit

When most people hear the term "SEO," they think about getting more clicks, climbing up Google's ranks, and squeezing into that coveted top-three spot. It's all very performance-driven-and fair enough. But there's another side to SEO that gets overlooked: security.