Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Building a Strong Security Approach for Financial Institutions

The security landscape for financial institutions has changed dramatically in recent years. Banks and credit unions face an onslaught of attacks unlike anything security professionals have ever seen before. As 2025 progresses, these threats aren’t letting up – they’re getting worse, forcing financial organizations to completely rethink how they protect sensitive data.

Anomaly Detection in IoT Networks: Securing the Unseen Perimeter

The explosion of Internet of Things (IoT) devices has transformed our world in countless ways, from smart factories to connected healthcare systems. According to recent projections by IoT Analytics, the number of connected IoT devices is expected to reach 40 billion by 2030 . This exponential growth has created an expansive and often invisible attack surface that traditional security measures struggle to protect.

APIs: The Silent Highway for Sensitive Data

Think about how your banking app connects to payment processors or how your healthcare provider’s system shares records securely – APIs have become essential for modern digital interactions, enabling applications to communicate and share data effortlessly. However, this convenience comes at a cost: APIs often handle vast amounts of Personally Identifiable Information (PII), making them prime targets for API data exfiltration.

Uncovering Cyber Risks in the Global Supply Chain

No organization can achieve its goals on its own. To truly get ahead in the rapidly transitioning digital society, any organization will need a diverse group of partners who specialize in the products and services they do not. Commonly referred to as a “supply chain” this web of connections ensures the world operates smoothly, but navigating its many connections is challenging. Luckily, Bitsight TRACE doesn’t shy away from a challenge.

Reconstructing the TJ Actions Changed Files GitHub Actions Compromise

In the afternoon on Friday, March 14, 2025, details began to emerge about a serious security exploit on a popular GitHub Action called changed files (tj-actions/changed-files). About 23,000 GitHub repos use this Action as part of their CI and DevOps workflows. It allows you to track which files have changed across branches and commits. An attacker with write privileges on the Action repo made a commit that caused encrypted secrets to appear in plaintext in the GitHub Action logs.

Enhanced security and simplified controls with automated botnet protection, cipher suite selection, and URL Scanner updates

At Cloudflare, we are constantly innovating and launching new features and capabilities across our product portfolio. Today, we're releasing a number of new features aimed at improving the security tools available to our customers. Automated security level: Cloudflare’s Security Level setting has been improved and no longer requires manual configuration.

Password reuse is rampant: nearly half of observed user logins are compromised

Accessing private content online, whether it's checking email or streaming your favorite show, almost always starts with a “login” step. Beneath this everyday task lies a widespread human mistake we still have not resolved: password reuse. Many users recycle passwords across multiple services, creating a ripple effect of risk when their credentials are leaked.