We break down Cloudflare’s Q1 2025 DDoS Threat Report, showing a 358% year-over-year increase in DDoS attacks. Omer Yoachimik, Senior Product Manager for DDoS at Cloudflare, unpacks it all in the full video.
AlgoSec works with applications by providing an application-centric approach to network security policy management. It maps and visualizes application connectivity flows, identifies associated firewall rules, and ensures that any changes to applications—such as migrations, updates, or deployments—are reflected securely and efficiently across the network.
By James Rees, MD, Razorthorn Security Communication is an essential element in every aspect of modern society. It underpins how we share ideas, manage difficult situations and advance our careers. In the information security sector, effective communication isn’t merely beneficial – it’s absolutely crucial. While technical competencies remain foundational, the ability to communicate clearly and effectively often determines success.
Oh dear, what a shame, never mind. Yes, it's hard to feel too much sympathy when a group of cybercriminals who have themselves extorted millions of dollars from innocent victims have found themselves dealing with their own cybersecurity problem. And that's just what has happened to the notorious LockBit ransomware gang, which has been given a taste of its own medicine.
In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community. During a talk at RSA, DHS Secretary Kristi Noem provided an update on the future direction of the Cybersecurity and Infrastructure Security Agency (CISA) under the new Trump administration. During the panel discussion titled “AI and Cyber Defense: Protecting Critical Infrastructure” which brought together federal research leaders to talk about how AI and automation are being leveraged to address mounting cyber risks across the U.S. critical infrastructure landscape.
Are you relying on free WAFs to keep your business safe? While they might seem like an easy, budget-friendly option, can they really protect you from sophisticated cyber threats like SQL injections, XSS, and bot attacks? Or are you missing critical layers of defense as your business scales? In this guide, we’ll answer these questions and more, comparing free and paid WAFs to help you understand the risks, features, and real-world implications of each.
Enterprises increasingly rely on third-party vendors to support critical operations, drive innovation, and provide essential services. However, as organizations expand their supplier networks, the complexities and challenges in ensuring vendor reliability—especially in terms of compliance, security, and operational excellence—have also grown. For leadership teams, automating vendor assessments is no longer a luxury but an operational necessity.
The three high-profile UK retailers struck with cyberattacks in the last few weeks are each still feeling the impact of the attacks and attempting to regain full functionality across all their systems.
As we continue to face an increasingly complex cybersecurity landscape, April 2025 has brought forward new vulnerabilities and the rise of more sophisticated cyber threats. Notable vulnerabilities in critical systems, including Microsoft, Adobe, Cisco, and others, underscore the importance of proactive security measures. Alongside these vulnerabilities, the persistence of ransomware groups continues to be a major concern for organizations globally.