Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

UK Organizations Cite Phishing as the Most Disruptive Type of Cyberattack

Phishing was the most prevalent and disruptive type of attack experienced by UK organizations over the past twelve months, according to the British government’s Cyber Security Breaches Survey 2025. 85% of businesses and 86% of charities in the UK reported sustaining phishing attacks last year. “The qualitative interviews highlighted that phishing attacks were often cited as time-consuming to address due to their volume and the need for investigation and staff training,” the report says.

Generative AI Usage Gone Rogue? Cato Networks Mitigates Shadow AI Risk with Cato CASB

Today during SASEfy 2025, Cato Networks announced its latest AI innovation. Cato CASB (Cloud Access Security Broker), a native feature in the Cato SASE Cloud Platform, is now enhanced with new capabilities for generative (GenAI) applications including a shadow AI dashboard and policy engine. With the shadow AI dashboard, enterprises can detect, analyze, and gain insights into the use of GenAI. With the policy engine, enterprises can take control of user activities in GenAI applications.

Cato CTRL Threat Research: Exploiting Model Context Protocol (MCP) - Demonstrating Risks and Mitigating GenAI Threats

Generative AI (GenAI) is advancing rapidly, offering significant potential for business transformation. However, it also introduces new security risks. The Model Context Protocol (MCP), an open standard introduced by Anthropic in November 2024, enables seamless integration between GenAI applications and external data sources and tools. MCP is commonly referred to as a USB-C port for GenAI applications.

Digital supply chain security: How to secure your supply chain with DLP and Secude

Data loss prevention (DLP) software provides strong protection after data is stored, Secude provides Zero Trust protection before data is stored. Together, they secure your digital supply chain. Ensuring digital supply chain security is a fundamental part of the EU’s NIS2 Directive - and for good reason. In recent years, digital supply chains have become the main targets of cyberwarfare, with supply chain attacks rising 2,600% since 2018.

Email List Hygiene and Cybersecurity Risks

Email is a tool that people and companies need. Conversely, poor email etiquette may put you in danger online from data leaks and phishing scams. Following cybersecurity best standards and keeping a clean email list helps to guard sensitive data. This paper covers the value of cyber hygiene in email contact, its benefits, and how technology, such as an email locating tool, could enhance security.

How to Set Up a Headless CMS with a Custom Frontend Framework

In an increasinglydigital world, the demand for flexible, scalable and agile web experiences has never been higher. The company can use a headless CMS with their own frontend framework and use it to customize the web page to the maximum limit they want for the bestperformance and still owning the UI components which are more suitable and they are aiming to achieve.

The Future of Inbound Call Center Services: AI, Automation, and Beyond

Inbound call centers have always been a vital part of customer service, but with rapid advancements in AI and automation, their future is changing. Today, businesses are utilizing these technologies to improve efficiency, cut costs, and deliver better experiences for customers.

How AI is revolutionizing third-party risk assessments

Enterprises rely heavily on third-party vendors for a vast spectrum of critical services. From IT support and supply chain management to specialized consulting and cybersecurity, the reliance on external partners has increased significantly. With this reliance comes the inherent risk that these vendors may pose to enterprise operations, reputation, and regulatory compliance.

Proton66 Part 1: Mass Scanning and Exploit Campaigns

Trustwave SpiderLabs continuously tracks a range of malicious activities originating from Proton66 ASN, including vulnerability scanning, exploit attempts, and phishing campaigns leading to malware infections. In this two-part series, SpiderLabs explores the malicious traffic associated with Proton66, revealing the extent and nature of these attacks.

Singapore's Scam Surge Strategy: What Enterprises Must Do Now Under the New Shared Responsibility Framework

Scam losses in the Asia-Pacific region continue to escalate, positioning the area as a global testing ground for phishing innovations. Singapore’s recent implementation of the Shared Responsibility Framework (SRF) serves as a critical alert for enterprises: both regulators and customers are demanding heightened vigilance.