Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Initial Access Brokers Explained

Initial access brokers (IABs) form a key part of the cybercriminal ecosystem. They facilitate access for ransomware groups, data leakers, and advanced persistent threat groups (APTs) into corporate networks. They are highly specialised, professional, and operate in an established, lucrative market which is often characterised by rigid rules and conventions. Every ransomware incident or data breach begins with initial access, following the reconnaissance phase of an attack.

The Fastest Way to Secure Your APIs? We've Got That Covered with CrowdStrike

APIs are the backbone of modern apps, but they also introduce some serious security risks. Attackers are constantly on the lookout for vulnerable APIs, shadow APIs, zombie APIs, and exposed sensitive data—all of which are tough to track if you don’t have the right tools in place. That’s why we’ve teamed up with CrowdStrike to make API security easier, faster, and more powerful than ever.

Upgraded Phishing-as-a-Service Platform Drives a Wave of Smishing Attacks

A phishing-as-a-service (PhaaS) platform dubbed ‘Lucid’ is driving a surge in SMS phishing (smishing) attacks, according to researchers at Prodaft. The platform is operated by Chinese cybercriminals who offer access to the service under a subscription model. A Lucid subscription allows crooks to easily craft sophisticated, targeted phishing campaigns.

Online Gaming Platform Steam Tops List of Most Imitated Brands For the First Time

Steam was the most impersonated brand in phishing attacks during the first quarter of 2025, according to a new report from Guardio. The researchers note that the gaming platform’s surge to the top comes as “a bit of a shock.” “Historically, the spot has been dominated by the usual suspects - big tech companies like Meta, Microsoft, or even USPS,” Guardio says. “But this quarter, it’s Steam, and by a significant margin.

10 Best IoT Security Companies in 2025 [Expert Opinion]

Security vendors love dashboards with polished interfaces, graphs, alerts, and AI-powered insights. But as a CTO, you don’t need another dashboard; you need security that works when it matters. When an attack slips through, the UI won’t save you—only real-time detection, automated defenses, and a team that responds before you even call will. The best IOT security companies don’t just sell tools; they embed security into the fabric of your infrastructure.

AI in IAM: Automate the monotonous tasks, not the vital ones

Lately, the common theme in emerging identity security technology is AI. It’s all anyone wants to talk about. All of us in the IAM business have been scurrying to find a way to tell our customers and the market that, yes! We have AI! We've had it all along! If that were so obviously true, why isn’t it more broadly known? As an identity security technologist, I’ve experienced the growing pains of AI in IAM. I recently read an interesting essay by a science fiction author.

Cyber Threat Intelligence to Counter Activist Campaigners

A new activist group is targeting insurance companies. Boycott Bloody Insurance (BBI) aims to raise awareness of the insurance industry’s role in perceived global injustices. Escalatory tactics that disrupt insurers’ day-to-day operations are possible. This may include physical threats against premises and individuals and/or logical threats, such negative social media or cyberattacks.

Security and SRE: How Datadog's combined approach aims to tackle security and reliability challenges

Security is essential to cloud-based development, but integrating it into dynamic, distributed environments is difficult. Factors like complex architectures and operational constraints often create roadblocks, which makes it harder to enforce security policies and mitigate threats. These challenges are especially apparent within security organizations, where siloes limit their ability to keep pace with the larger organization as it scales.

From Alert to Action: Best Practices to Handle Responsible Disclosure

Responsible disclosure is an often overlooked but critical component of cybersecurity alerting processes. Explore key best practices that can enhance communication and collaboration with researchers, turning potential security threats into opportunities for stronger defense.