Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A Guide to Comprehensive Payment Gateway Testing

With global e-commerce transactions projected to exceed $8.1 trillion by 2026, according to Statista, payment gateways are an irresistible target for attackers. A single exploit, like a poorly configured API or insecure redirect, can lead to massive fraud, compliance violations, and irreparable loss of customer trust. Yet, many businesses still rely on surface-level testing or compliance checklists, missing critical flaws in business logic, API behavior, and payment flow integrations.

SharePoint Zero-Day Exploits Highlight Hidden Secrets Risk in Document Collaboration Tools

The recent SharePoint zero-day exploits expose a critical blind spot: hardcoded secrets hidden in collaboration tools. While teams secure code repositories, API keys and credentials lurking in SharePoint documents create dangerous attack vectors for lateral movement.

AI and the 2025 SIEM landscape: A guide for SOC leaders

Security teams often find themselves having to put out the immediate fires in front of them, but this comes at the expense of implementing a more methodical risk reduction strategy. Attack surfaces are expanding, and new risks emerge with new tech. Modern security operations center (SOC) teams are drowning in alerts, stretched thin by talent shortages, and racing to stay ahead of increasingly sophisticated adversaries.

Stolen by the Scrapers: How to Protect and Profit from Your Content in the Age of AI

What is LLM Scraping? We’re entering a new phase of the Internet, one that is increasingly shaped by generative AI. These systems need data, and lots of it. To meet this hunger, they scrape the web, pulling in everything from news articles and academic journals to product listings, metadata, and user-generated content. This practice, known as large language model (LLM) scraping, has moved far beyond traditional bots indexing public sites.

3 VNet Use Cases to Simplify Internal Access (Without VPNs)

VPNs have their time and place. But at Teleport, we don’t think accessing internal engineering resources is one of them. VPNs create friction, slow down development workflows, and often become security bottlenecks. That's where VNet comes in. Teleport VNet was designed to give engineers a secure way to access internal applications without VPNs or port forwarding.

CitrixBleed 2: When Memory Leaks Become Session Hijacks

The cybersecurity community is facing yet another critical infrastructure vulnerability that threatens enterprise networks worldwide. CVE-2025-5777, dubbed "CitrixBleed 2" by security researcher Kevin Beaumont, represents a dangerous out-of-bounds memory read vulnerability in Citrix NetScaler ADC and Gateway devices. This new flaw bears an unsettling resemblance to the original CitrixBleed (CVE-2023-4966), which was widely exploited by ransomware groups and nation-state actors in 2023.

Ransomware in First Half of 2025: An Ecosystem in Flux

The first half of 2025 has been a period of disruption and realignment within the ransomware ecosystem. Following years of dominance by a few key players, the landscape has fragmented into a chaotic and highly competitive market defined by new leaders, divergent attack strategies, and a laser focus on high-pressure targets. In total, more than 3,000 ransomware incidents were recorded in the first six months of the year. The overall threat has not diminished; it has become more unpredictable.

Cato CTRL Threat Research: Analyzing LAMEHUG - First Known LLM-Powered Malware with Links to APT28 (Fancy Bear)

On July 17, 2025, Ukraine’s Computer Emergency Response Team (CERT-UA) publicly reported LAMEHUG, which is being documented as the first known malware that integrates large language model (LLM) capabilities directly into its attack methodology.

CVE-2025-53770: SharePoint Zero-Day Under Active Exploitation

CVE-2025-53770 is a live, high-severity threat that is already being exploited across global networks. This critical vulnerability in Microsoft SharePoint Server allows unauthenticated attackers to execute arbitrary code remotely, effectively handing them the keys to your infrastructure. As of July 2025, over 85 SharePoint servers have reportedly been breached. And if your organization uses SharePoint 2016, 2019, or Subscription Edition on-premises, you could be next.

Attack Surface to Action: The Power of Censys ASM + Seemplicity

Security teams juggle a multitude of tools to keep their organizations safe. One platform scans for exposed assets, another tracks vulnerabilities, and yet another manages remediation tasks – and the list goes on. Organizations use an average of 38 different security products, leading to fragmented processes and a lot of “noise” in the form of findings. It’s no surprise that 85% of security professionals say all this noise makes it challenging to reduce risk quickly.