Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Unlocking Profit: How Bankers Can Harness Stablecoins for Revenue Growth

Brian Moynihan recently remarked, “It’s pretty clear there’s going to be a stablecoin… So if they make that legal, we’ll go into that business …it’s just then like another foreign currency.” While the comments from the CEO of Bank of America capture one bank use case for stablecoins, these digital assets have much more to offer banks than that.

How we navigated database limits with a growing product

In 2024, one of Vanta’s engineering goals was to improve the quality while maintaining our rapid product development. Around the same time, we also discovered we were months away from reaching our MongoDB Atlas database storage limit. If this threshold was reached, then we wouldn't be able to write any new data and the Vanta product would’ve been heavily degraded. This was a clear signal that we needed to invest more in our infrastructure and storage solution. ‍

Lack of Security Awareness Tops List of Obstacles to Cyber Defense

Most organizations cite low security awareness among employees as the biggest barrier to defending against cyberattacks, according to a new survey by CyberEdge Group. “This result reinforces the idea that in cybersecurity, as in so many other areas of business and life, people challenges trump technology issues every time,” the researchers write. “Without doubt, although computers speed up every year, people don’t (and some days we suspect they are getting slower).

The Continued Abuse of Legitimate Domains: A Spike in the Exploitation of Google Drive to Send Phishing Attacks

First QuickBooks, then Microsoft, and now Google—will the hijacking of legitimate third-party platform communications stop escalating in 2025? Our Threat Labs researchers predict the answer is no. As long as these attack tactics remain effective, cybercriminals will continue to use them, which likely explains the spike in the exploitation of Google Services for phishing attacks observed in the first month of 2025.

The Critical Importance of Supply Chain Risk Management in Cybersecurity

In the contemporary digital era, supply chains have transcended their traditional role as mere logistical networks. They have evolved into pivotal ecosystems that underpin the success of modern businesses. Nevertheless, as these intricate systems undergo digital transformation, they have become increasingly vulnerable to cyberattacks.

Building better workflows with multiple drafts

In today's security and IT landscape, the workflows that power your operations are not merely convenient tools—they're essential infrastructure. When a phishing detection workflow fails or an access control process malfunctions, the consequences can be severe: security incidents remain undetected, response times suffer, and organizational risk escalates significantly. This reality creates a paradox for teams.

Credential Access Campaign Targeting SonicWall SMA Devices Potentially Linked to Exploitation of CVE-2021-20035

On April 15, 2025, SonicWall published a product notice regarding CVE-2021-20035, a vulnerability impacting SonicWall SMA 100 series appliances. In an updated security advisory for the vulnerability, SonicWall indicated on April 15, 2025 that the vulnerability was being exploited in the wild. The vulnerability was added to CISA’s known exploited vulnerabilities (KEV) catalog the following day.

Essential Features to Look for in a Shovel for Metal Detecting Success

Unearthing treasures with a metal detector requires precision, patience, and the right equipment. A dependable shovel for metal detecting is more than a digging tool-it's a partner in preserving artifacts and maximizing efficiency. The perfect shovel enhances your ability to extract coins, relics, or jewelry without damage, whether you're sweeping beaches or old homesteads. With countless designs available, focusing on key features like blade strength, handle comfort, and portability ensures success.

ThreatQuotient Celebrates Record Year Marked by Major Customer and Partner Growth, Product Innovation, and Industry Recognition

ThreatQuotient delivers exceptional growth and innovation over the past year. This growth has been fueled by increasing market demand for simplified security automation technologies to address the challenges around threat intelligence management and security operations. ThreatQuotient's annual Evolution of Cybersecurity Automation Adoption research underlined this momentum.