Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Trustwave Named a Representative Vendor in 2025 Gartner Market Guide for Third-Party Risk Management Technology Solutions

The industry analyst firm Gartner has named Trustwave a Representative Vendor in its latest publication, 2025 Gartner Market Guide for Third-Party Risk Management Technology Solutions. Trustwave believes the report is a guide for organizations considering third-party risk management (TPRM) technology solutions from vendors that will best suit their needs.

How to Get Started With Fuzz Testing

If you recognize the benefits that fuzz testing can bring to your software security but are new to it, read on. In this blog post, you’ll learn what you need to consider before implementing fuzz testing in your company to ensure a smooth and successful adoption. So, you’ve chosen the light side and decided to find and fix bugs in your code before they become a problem. Well done, and congrats!

What Is a Remote Access Trojan (RAT), and Why Should You Care?

According to our 2025 State of the Underground report—in which we take a look back at cybercrime on the deep and dark web from the past year—384 unique varieties of malware were sold in 2024, an increase from 349 in 2023. To determine this number, our research team examined malware and hacking tools for sale on the top three criminal forums, and as a result, we found that Remote Access Trojans (RATs) were the second most common form of malware in 2024, just behind stealer malware.

European Stablecoin Adoption: Intentional Progress, Strategic Scale

Stablecoins have moved beyond early experimentation, as Fireblocks’ State of Stablecoins 2025 report shows. Based on insights from nearly 300 C-suite executives across banking, fintech, and crypto-native firms, the findings indicate a clear shift from pilot programmes to operational deployment. In Europe, that shift is unfolding with measured intent—driven by regulatory clarity, infrastructure readiness, and a clear focus on competitive positioning.

PCI DSS in Canada: 5 Common Mistakes Businesses Make

For Canadian businesses that process, store, or transmit credit card information, PCI DSS compliance isn’t optional—it’s mandatory. Yet, many companies misinterpret key requirements or overlook crucial steps, leaving themselves vulnerable to data breaches, fines, and reputational damage. This article explores the most common pitfalls organizations face with PCI DSS in Canada and outlines how to build a more secure, compliant environment.

Apono Expands Cloud Access Management Platform to Secure Both Human and Non-Human Identities with Scale and Speed

With this release, Apono provides customers a unified cloud access solution that delivers automated, Just-in-Time, Just Enough access for every identity—whether person or machine.

PureHVNC RAT Using Fake High-level Job Offers from Fashion and Beauty Brands

In recent months, the Netskope Threat Labs team has observed several different campaigns delivering the PureHVNC RAT and its plugins. In 2024, the same malware was observed being delivered via a Python chain, and a few days ago, it was also observed using genAI sites to lure victims. In this blog post, we’ll describe an infection chain using different methods to lure the victim and successfully deliver the PureHVNC RAT.

Outpost24 Named an Overall Leader in 2025 KuppingerCole Leadership Compass Report for Attack Surface Management

Recognition Solidifies Outpost24’s Leadership in Attack Surface Management PHILADELPHIA (May 27, 2025) — Outpost24, a leading provider of cyber risk management and threat intelligence solutions, today announced it has been recognized as an Overall Leader in the 2025 KuppingerCole Leadership Compass Report for Attack Surface Management and is the only European vendor named as an Overall Leader in the report. The company was also named a leader in the Product and Market categories.

Welcome to Snyk Labs: Charting the Course for AI-Native Security

Software development is in the midst of a monumental shift, powered by the rapid advancements in Artificial Intelligence. AI isn't just changing how we build software; it's transforming the very nature of applications themselves. As AI-native applications become more prevalent, we're also seeing new, complex security threats emerge. Traditional security approaches aren’t designed for the dynamic and often unpredictable nature of Large Language Models (LLMs), agents, and other AI-driven systems.