Your Digital Footprint and Why it Matters!

You know that trail of bread crumbs you leave across the internet? Cybercriminals love to eat them up! Every post. Every like. Every old username from 2012, it all sticks around. And scammers can use that info to guess passwords, target you, or piece together your whole life story. So post smart. Share less. Protect more.

Hybrid Work Risks That Start in the Office: What Companies Often Overlook

Hybrid work has become a defining part of modern business, yet many companies underestimate the extent to which risk originates in the physical workspace. Employees move between home and office with new expectations, and the environment they return to often shapes their performance more than policies do. Rooms that once supported predictable routines now carry a different emotional weight, influencing how people communicate, collaborate, and settle into their day.

Online IQ Testing in the Age of Cybersecurity

As more psychological and cognitive assessments move online, questions about data security, privacy, and trust have become just as important as test accuracy. From personality tests to intelligence assessments, users are increasingly cautious about where they enter personal information and how that data is handled.

How AI agent privileges are redefining cyber insurance expectations

When ransomware drove record losses, insurers began scrutinizing basic controls like multi-factor authentication (MFA), backups, and endpoint detection. Now, AI-driven automation is introducing a new category of risk—AI agents—and insurers are responding with heightened attention to privilege management. AI agents are non-human identities that can approve payments, access sensitive data, and execute commands using powerful API keys.

Transforming AI Risk Awareness Into Measurable AI Governance

Only a few years ago, after more than a decade of debate over how cybersecurity incidents affect the financial stability of public companies, the U.S. Securities and Exchange Commission (SEC) finally made cyber risk disclosure a formal requirement. The intent was to bring transparency and accountability to a category of risk that had long been treated as technical rather than financial. Now, albeit voluntarily, AI has entered that same conversation, but the speed of its arrival has been remarkable.

Warning: Phishing Campaign Leveraging Evilginx Targets U.S. Universities

Threat actors are using the open-source phishing framework Evilginx to target universities across the United States, according to researchers at Infoblox. The attackers have targeted at least 18 universities and educational entities since April 2025, using phishing pages that spoofed student single sign-on (SSO) portals. “In the campaigns we analyzed, students were targeted via personalized emails that contained TinyURL links,” Infoblox says.

How Salt Security & AWS Simplify API Security

See your Blind Spots in Minutes, not Months: How Salt Security & AWS Simplify API Security AI agents and cloud-native architectures have unleashed a wave of APIs and with them, new attack surfaces. Most security teams are struggling to keep up, especially in dynamic AWS environments where shadow and zombie APIs can easily go undetected. This Salt Security and AWS webinar explores a better approach to API discovery and security in AWS without the burden of in-line traffic collection or sensor deployments.

The role of credentials in the AI espionage campaign reported by Anthropic

Anthropic recently announced that the company has disrupted the first reported AI-orchestrated cyber espionage campaign. This attack used Claude Code to automate many steps, with AI handling up to 90% of the tasks, including web searches and the autonomous writing of exploit code. The attackers bypassed Claude’s guardrails by breaking each step into small tasks and role-playing as a red team member.

When Al Agents go Rogue: What you're Missing in your MCP Security

No Fluff, Just Real-World Threats This isn’t your typical marketing webinar. We cover what Agentic AI actually looks like in production, how MCP servers work to broker instructions, and what kind of new threats are emerging. Agentic AI isn’t coming. It’s already here. Autonomous agents are now operating in production environments, reasoning, remembering, and taking real actions across your systems. They’re not just generating content. They’re triggering workflows, modifying records, and making decisions. And they’re doing it over APIs.

Best Tools for Automated GDPR Compliance Monitoring

Most websites today are more complex than their owners realise. A single page can load a mix of analytics, pixels, and vendor scripts, all shaping how personal data flows through the browser. And because GDPR now treats this browser activity as processing, it becomes part of the compliance picture even when it comes from third-party tools. Which means regulators naturally expect organizations to understand this activity as it happens.