Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Human Element: Addressing Cybersecurity Risk in Danish and Swedish Organizations

We recently conducted research in Denmark and Sweden to understand security culture in local organizations better. This research reveals a critical vulnerability in Danish and Swedish organizations - nearly 70% of employees in Denmark and 72% of employees in Sweden receive no cybersecurity training at their workplace. This gap in security awareness creates vulnerabilities that could affect organizations at every level.

Act Now: Phishing-as-a-Service Attacks are on the Rise

Phishing-as-a-service (PhaaS) platforms drove a surge in phishing attacks in the first two months of 2025, according to researchers at Barracuda. PhaaS platforms, which provide criminals with a ready-made kit for launching advanced phishing attacks, were responsible for more than a million attacks in January and February. Three PhaaS platforms accounted for nearly all of these attacks, with the Tycoon 2FA kit dominating the market.

Alleged Oracle Cloud Supply Chain Attack: Six Million Records Stolen, 140K Companies Affected

On March 20, 2025, a Breach Forums user, “rose87168,” claimed to have stolen six million records from Oracle Cloud’s SSO and LDAP services and offered the data for sale or in exchange for zero-day exploits. Breach Forums is a known marketplace for cybercriminals to trade stolen data and exploits.

Understanding Kubernetes Cluster Architecture: Master & Worker Nodes Explained

Kubernetes has evolved into the industry standard for orchestrating containerized applications. In this article, we break down the architecture of a Kubernetes cluster using practical examples, and code snippets. Whether you’re a beginner or an experienced engineer, you’ll gain clarity on the roles of control plane (historically “master”) and worker nodes, the nuances of multi-control-plane deployments, and updated OpenShift configurations.

The Future of Agentic AI

Last April, Microsoft Security Copilot taxied down the runway and took flight to help passengers onboard to reach new destinations in cyber defense. BlueVoyant, as a Microsoft Security Copilot pre-launch design advisory council member, was a trusty flight attendant that helped Security Copilot safely take off. Today, as Security Copilot has reached its cruising altitude, Microsoft announced Security Copilot agents that help its passengers to further optimize Microsoft Security tools usage.

CrowdStrike Falcon Exposure Management Expands Security to Unmanaged Network Assets with Network Vulnerability Assessment

As organizations strengthen endpoint and cloud security, attackers are shifting their focus to often-overlooked network infrastructure like routers, switches, and firewalls. Legacy vulnerability management (VM) solutions struggle to keep pace, relying on slow, periodic scans that fail to provide real-time visibility into emerging threats.

Credit Card Cloning: What Is It , How It Works, and How to Protect Yourself

Discover a charge on your credit card that you don’t recognize. It could be from a card cloning event. Card cloning predominantly affects credit cards, but this phenomenon may also impact some payment platform cards (like those from PayPal or Zelle). In short, card cloning occurs when the card’s magnetic strip or chip is used in unauthorized transactions. Credit card cloning is a form of fraud, but it differs from others in its more nuanced elements.

CVE-2025-29927 - Authorization Bypass Vulnerability in Next.js: All You Need to Know

On March 21st, 2025, the Next.js maintainers announced a new authorization bypass vulnerability – CVE-2025-29927. This vulnerability can be easily exploited to achieve authorization bypass. In some cases – exploitation of the vulnerability can also lead to cache poisoning and denial of service.

WatchGuard Wins CRN 5-Star for 9th Year, Dominating MSP Security

At WatchGuard, we proudly announce that our WatchGuardONE partner program has received the prestigious 5-star rating from CRN, a brand of The Channel Company, in the 2025 CRN Partner Program Guide. This marks the ninth consecutive year WatchGuard has earned this recognition, solidifying the commitment to providing the industry’s most powerful, profitable, and MSP-friendly security solutions.