Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

World Password Day 2025: Why the future is passwordless (but not password-free)

Each year on World Password Day, most password managers will remind you that sticky notes are no place for storing passwords, to avoid using “password123,” or to stop repeating passwords across multiple accounts. That is all sound advice, but we’re in 2025. Passwords are still everywhere, but our relationship with them has evolved — or rather, devolved.

Weeding Out Cyber Threats: How to Detect and Stop Common Attacks

When necessary, you water it, monitor it, and weed out what doesn’t belong before it spreads. The same principle applies to cybersecurity. In today’s digital landscape, cyber threats evolve rapidly. From phishing and privilege escalation to rogue access and lateral movement, attacks often take root well before they’re discovered. That’s why detection and response are no longer optional ‒ essential for resilience.

Email Remains the Top Attack Vector for Cyberattacks

Email is still the most common attack vector for cyber threats, according to a new report from Barracuda. The researchers found that one in four emails during February 2025 was either malicious or spam. HTML attachments were the most common file type used in phishing emails. “One of the most striking findings from the report is that 23% of HTML attachments are malicious, making them the most weaponized type of text file,” Barracuda says.

Xfinity Scam Might Explain Similar Scams

Recently, I covered a T-Mobile scam where a friend of mine narrowly avoided losing money. In that scam, the attackers called up pretending to be from T-Mobile offering him a cannot-pass-up 30% discount on future T-Mobile bills. While he was initially suspicious of the unexpected callers, they gained his confidence by repeating the amounts of his last two T-Mobile bills, billing address, and knew that his wife was also on the account.

From Alert Fatigue to Focused Response: A New Way Forward for The SOC

We’re all exhausted—both by the problem and by hearing about it. False positives and overwhelming alert volume have long plagued security operations. And despite years of innovation, solutions have remained elusive. Alert volume. Alert fatigue. SOC burnout. This persistent problem puts security teams in a tough position: For CISOs and SOC managers, it’s a lose-lose scenario.

HHS HIPAA Guidelines Target Tracking on Public Web Pages

The U.S. Department of Health and Human Services (HHS) has shared new guidance on HIPAA. This guidance focuses on using tracking technologies on public healthcare pages. This updated directive directly impacts healthcare organizations utilizing tools like Meta Pixel, Google Analytics, or session replay scripts. While these are effective for understanding user engagement, they may inadvertently collect PHI—protected health information—if configured improperly.

PowerPoint Plugin for Charts vs Excel Embeds for Live Presentations

If you present data often, you know how long it can take to make slides look clean and easy to understand. With the right tools, you can save time while achieving professional results. Many presenters rely on Excel embeds, but more are now turning to a PowerPoint plugin for charts to simplify the process. In this article, we'll compare both options and help you figure out which one fits your presentation style and goals best.

Teleport Secures Model Context Protocol, Unleashing AI Innovation focused on Large Language Model (LLM) Interactions with Infrastructure Data

Teleport announces support for securing the Model Context Protocol (MCP), enabling organizations to secure interactions between Large Language Models (LLMs) and their workloads and data. By leveraging the Teleport Infrastructure Identity Platform's support for MCP, companies can now safely harness cutting-edge AI, leveraging the same trust architecture from Teleport that enables human and non-human identities to securely interact with cloud workloads and with each other.