Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Use the OWASP AI Testing Guide to Pentest AI Applications (2025)

For years, the cybersecurity community has discussed the theoretical risks of artificial intelligence. We’ve imagined biased algorithms and adversarial attacks, but these conversations usually stayed hypothetical. That era is over. It’s time to move beyond the theory and into the practical “how-to” of finding and exploiting vulnerabilities in AI systems. To execute this, the new OWASP AI Testing Guide (AITG) is indispensable.

Newsweek Recognizes Keeper as One of America's Best Online Platforms

Keeper Security was named one of America’s Best Online Platforms in 2025 by Newsweek and Statista, earning ninth place in the Business Products category. With 500 platforms recognized, Keeper is the highest-ranked cybersecurity platform, reflecting the company’s reputation for delivering high-grade security and seamless user experiences to enterprises and consumers.

What Akira Ransomware Gang Taught This Company

What is ransomware? Ransomware is a form of malicious software that encrypts an organization’s files or systems, effectively locking users out until a ransom is paid, usually in cryptocurrency. But in 2025, ransomware is more than just malware. It’s a multi-billion-dollar criminal business. So far this year, 4,441 organizations have been publicly listed as ransomware victims.

Invitation Is All You Need: Invoking Gemini for Workspace Agents with a Simple Google Calendar Invite

Over the last two years, various systems and applications have been integrated with generative artificial intelligence (gen AI) capabilities, turning regular applications into gen-AI powered applications. In addition, retrieval augmented generation (RAG)-which is the process of connecting gen-AI and large language models (LLMs) to external knowledge sources-and other agents have been incorporated into such systems, making them more effective, accurate, and updated.

Insider Threat Statistics for 2025: Key Facts, Types of Incidents, and Costs

Understanding the current landscape of insider threats in cybersecurity is essential for any organization aiming to strengthen its security posture. As the nature of internal risks evolves, tracking the latest trends empowers security leaders to make smarter, more proactive decisions. In this article, we break down the latest research, share expert insights, and highlight real-world incidents to help you assess your organization’s vulnerabilities and refine your insider threat management strategy.

The life and death of an AI agent: Identity security lessons from the human experience

AI agents are on the rise. They can spin up, act independently, use tools, and make decisions—often without real-time human oversight. They promise incredible productivity but also introduce new risks and challenges that can’t be ignored. As these agents become more autonomous and integrated into enterprise operations, they blur the lines between human and machine responsibilities. This raises critical questions: How do we ensure they act ethically?

Social Engineering Attacks Surged in the First Half of 2025

Cybersecurity incidents nearly tripled in the first half of 2025, jumping from 6% in the second half of 2024 to 17% in 2025, according to a new report from LevelBlue. Business email compromise (BEC) remains the most common method for initial access, but non-BEC tactics rose by 214%. The researchers observed a major surge in social engineering attacks, driven by the recent popularity of the ClickFix tactic.

Beyond Traditional Defenses: Why French Cyber Resilience Needs to Improve

In today's world, cyberattacks are a constant threat. While technical defenses are crucial, people often remain the easiest attack vector for cybercriminals. To gauge the resilience of French employees against cyberattacks, we looked at the impact of security awareness training (SAT) and phishing simulations in strengthening their defenses. Our latest report, "Go Phish: How Susceptible Are French Employees To Malicious Attacks?", aims to provide some insight.

What Every MSP Ignores Until It's Too Late - The Recovery Gaps That Cost Clients, Confidence and Revenue

Most MSPs think they’re ready. They have backups. Maybe cloud syncs. Some monitoring. No major restore incidents… yet. But here’s the reality: MSPs don’t lose clients over support delays or feature gaps. They lose them when recovery fails silently, unexpectedly, and publicly.