Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Government Organizations Lose Nearly a Month in Downtime for Every Ransomware Attack

Recent research by Comparitech reveals the shocking truth about ransomware attacks on government entities; they have a longer impact than anyone thought. Tracking over 1100 government-targeted ransomware attacks over a period of six years, researchers discovered that each day of downtime cost entities nearly $83,600, and that in each attack the downtime lasted for an average of 27.8 days.

How IoT Security Cameras Are Susceptible to Cyber Attacks

The proliferation of Internet of Things (IoT) devices - more specifically, security cameras - has forced organizations to rethink how they protect their physical hardware. Security cameras represent some of the most common IoT devices installed in business and commercial environments. Recent estimates suggest the smart camera market is expected to grow at an astronomical rate, reaching a potential valuation of $12.71 billion by 2030, growing at a Compound Annual Growth Rate of 10%.

Security Bulletin: OttoKit WordPress Plugin Vulnerability, CVE-2025-27007

CVE-2025-27007 is a critical unauthenticated privilege escalation vulnerability affecting the OttoKit WordPress plugin (formerly SureTriggers), which is used by over 100,000 websites for workflow automation and third-party integration. The vulnerability exists in the plugin’s create_wp_connection() function, which fails to properly verify user authentication when application passwords are not configured.

TrustCloud raises $15M to accelerate GRC Transformation for enterprise CISOs

When I speak to enterprise CISOs and GRC leaders, they often talk to me about 2 problems: Today we unlocked a huge milestone for TrustCloud that will help us scale operations to solve these 2 problems for enterprise CISOs and GRC leaders. We’ve raised $15M in strategic funding led by ServiceNow Ventures, with participation from Cisco Investments, Presidio Ventures, OpenView Venture Partners, Tola Capital, and other existing investors. (Read official press release)

Application Security Testing: Security Scanning and Runtime Protection Tools

Application security testing (AST) is the process of identifying and fixing security vulnerabilities in software applications. It ensures that applications are protected against threats such as unauthorized access, data breaches, and code manipulation. The application layer continues to be the most attacked and hardest to defend in the enterprise software stack.

DDoS Protection: Insurance Policy or Proactive Defense?

Historically, smaller organizations or those outside highly targeted industries for distributed-denial-of-service (DDoS) attacks have thought of DDoS protection more akin to an insurance policy than proactive cyber defense, i.e. we’ll put some reactive processes in place “in case we get hit,” but not much more.

Translating Threat Intelligence into Boardroom Value

In fast-paced threat intelligence environments, day-to day focus is often on monitoring risks, responding to incidents, and staying ahead of evolving threats. In the middle of this operational intensity, structured board reporting can easily be overlooked. But as threat landscapes grow more complex and cyber risks gain board-level attention, the absence of clear, strategic reporting becomes a liability. Board reporting isn’t just a good practice, its a regulatory imperative.

How to Implement a Zero Trust Strategy

The ways in which people work are changing, and so are the approaches needed to secure modern work. As organizations race to gain the benefits of cloud computing, relax rules around bring-your-own devices, and leverage hybrid-work models that require edge devices such as VPN gateways, the result is an expanding, disparate IT environment. And even worse, users are a part of the attack surface — one threat actors are all too ready and willing to exploit.

Bitdefender's ATS and MDR: Empowering MSPs to Secure Client IT Infrastructure

Cybersecurity threats are growing in sophistication, targeting businesses of all sizes. For Managed Service Providers (MSPs), securing clients' IT infrastructure is a critical responsibility, yet resource constraints and evolving threats make it a daunting challenge. Bitdefender, a global cybersecurity leader, addresses these pain points with its cutting-edge Attack Surface Reduction (ATS) and Managed Detection and Response (MDR) technologies integrated into the GravityZone platform.