Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Power of Automated Risk Resolution: Simplifying Security for Your Team

In today’s cybersecurity landscape, security teams face a daunting challenge: managing an ever-growing volume of risks with limited time and resources. Traditional manual risk resolution methods are no longer sufficient. They slow down response times, increase the risk of human error, and strain already stretched teams—ultimately compromising the organization’s security posture. That’s where automated risk resolution comes in.

Inside RansomHub: Tactics, Targets, and What It Means for You

Ransomware attacks are undeniably on the rise—but just how significant is the increase? According to Bitsight CTI researchers, ransomware attacks (as measured by unique victims listed on leak sites) rose by almost 25% in 2024, and the number of ransomware group leak sites rose by 53%. Ransomware is becoming the go-to tactic for financially driven threat actors seeking quick and substantial payouts.

Threat Modeling Checklist for Mobile App Development

As mobile apps become increasingly central to business operations and user engagement, securing them from design to deployment has never been more critical. Threat modeling offers an essential first step in identifying and mitigating potential security risks early in the development process. It helps you think like an attacker, spotting weaknesses before they can be exploited.

The Worsening Landscape of Educational Cybersecurity

Last year, KnowBe4's report "Exponential Growth in Cyber Attacks Against Higher Education Institutions" illustrated the growing cyber threats facing universities and colleges. The report highlighted the perfect storm of factors making educational institutions prime targets: vast data repositories, open networks, limited security resources, and decentralized governance structures.

New Unrestricted AI Tool Can Assist in Cybercrime

Researchers at Certo warn that a new AI chatbot called “Veniceai” can allow cybercriminals to easily generate phishing messages or malware code. The tool, which only costs $18 per month, is growing in popularity on criminal forums. “One of the starkest contrasts between Veniceai and more mainstream AI systems like ChatGPT is how each responds to harmful or malicious requests,” Certo says.

Introducing Salt Illuminate: API Security That Works in Minutes, Not Months

APIs are the backbone of modern business. They connect services, power user experiences, and enable innovation at breakneck speed. But they’ve also become one of the largest, most complex threat surfaces out there—and traditional security approaches just aren’t cutting it. At Salt Security, we’ve spent years pioneering API protection. And today, we’re thrilled to announce our biggest leap forward yet. Meet Salt Illuminate.

ConnectWise Breach Attributed to Nation-State Threat Actor

On May 28, 2025, ConnectWise published an advisory disclosing suspicious activity within its environment, attributed to a sophisticated nation-state threat actor known for intelligence collection. The activity reportedly affected a very small number of ScreenConnect customers, all of whom ConnectWise has directly contacted. Details remain limited as the investigation is ongoing.

OWASP API Cheat Sheet - From Developer Guidance to Executive Strategy

OWASP’s API Security Cheat Sheet is a familiar resource for many cybersecurity leaders—often bookmarked, rarely reimagined. But what if this seemingly developer-focused reference held the blueprint for executive-level strategy? For CISOs and CFOs operating in the era of digital ecosystems and financial APIs, this cheat sheet is not just tactical guidance—it’s strategic armor.