Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Indusface Achieves PCI DSS v4.0.1 Certification

We are excited to announce that Indusface has successfully achieved PCI DSS v4.0.1 certification as a service provider, reinforcing our commitment to industry-leading security and compliance. This milestone underscores our dedication to protecting sensitive cardholder data and helping businesses navigate evolving security regulations.

How AppTrana WAAP Supports PCI DSS v4.0.1 Compliance

PCI DSS (Payment Card Industry Data Security Standard) v4.0.1 is designed to protect cardholder data and secure payment environments. Compliance with PCI DSS is critical for any organization that stores, processes, or transmits payment card information. The framework helps prevent fraud, data breaches, and financial losses associated with cyber threats targeting payment systems.

CVE-2024-4577 - PHP-CGI RCE Exploitation in Windows Servers

A newly identified cyber campaign has been actively targeting organizations across multiple sectors in Japan since January 2025. Threat actors of unknown origin have been exploiting CVE-2024-4577, a critical remote code execution (RCE) vulnerability in the PHP-CGI implementation of PHP on Windows, to gain unauthorized access to victim systems. This campaign has primarily impacted Japan’s technology, telecommunications, and e-commerce industries.

Online Anonymity Explained: 10 Tools for Anonymous Browsing

Is true anonymity possible online? As more companies and governments threaten our online privacy, people are looking for more ways to browse the internet with increased privacy or total anonymity. We will therefore explore why people are choosing to browse the web anonymously, why it’s important, and popular tools to browse the web with increased privacy or total anonymity.

Agentic AI: Why Cyber Defenders Finally Have the Upper Hand

My two previous recent postings on AI covered “Agentic AI” and how that impacts cybersecurity and the eventual emergence of malicious agentic AI malware. Both of those articles started to touch on the idea of automated agentic AI defenses. This posting goes into a little more detail on what agentic AI defenses might mean. It starts with agentic AI, which is a collection of automated programs (i.e., bots or agents) working toward a common goal.

The Cybersecurity Confidence Gap: Are Your Employees as Secure as They Think?

Our recent research reveals a concerning discrepancy between employees' confidence in their ability to identify social engineering attempts and their actual vulnerability to these attacks. While 86% of respondents believe they can confidently identify phishing emails, nearly half have fallen for scams in the past. This disconnect between perceived competence and demonstrated vulnerability, the "confidence gap", poses a substantial risk to organizations. The Danger of Overconfidence.

Booking.com Phishing Scam Targets Employees in the Hospitality Sector

A phishing campaign is impersonating travel agency Booking.com to target employees in the hospitality industry, according to researchers at Microsoft. The attacks use a social engineering technique called “ClickFix” to trick victims into downloading malware.

Securing XIoT in the Era of Convergence and Zero Trust

The rise of connected devices has fundamentally reshaped industries, enabling unprecedented levels of automation, efficiency, and innovation. These devices fall under the Extended Internet of Things (XIoT), a broad category encompassing traditional Internet of Things (IoT) devices, operational technology (OT), industrial control systems (ICS), the Internet of Medical Things (IoMT), and other connected assets that span enterprise IT and operational environments.

Unleashing improved context for threat actor activity with our Cloudforce One threat events platform

Today, one of the greatest challenges that cyber defenders face is analyzing detection hits from indicator feeds, which provide metadata about specific indicators of compromise (IOCs), like IP addresses, ASNs, domains, URLs, and hashes. While indicator feeds have proliferated across the threat intelligence industry, most feeds contain no contextual information about why an indicator was placed on the feed.

Extending Cloudflare Radar's security insights with new DDoS, leaked credentials, and bots datasets

Security and attacks continues to be a very active environment, and the visibility that Cloudflare Radar provides on this dynamic landscape has evolved and expanded over time. To that end, during 2023’s Security Week, we launched our URL Scanner, which enables users to safely scan any URL to determine if it is safe to view or interact with.