Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

ARaaStocracy - RALord ransomware emerges with new DLS

The latest data leaks site (DLS) CYJAX has identified is titled RALord, which constitutes one of 14 new DLSs identified in March 2025 alone. This Ransomware-as-a-Service (RaaS) group appears to be sophisticated and professional, providing services including affiliates, data ransoms, and dark web advertisements. It has been reported that the group is active on at least one cybercriminal forum under the username ‘ForLord’.

World Backup Day: Having a backup plan is always your best option

It’s not really a surprise that as the weather begins to slowly change from winter to spring that dreams of summer start to creep into our consciousness. Out of all of the things that come along with summer, one of my all-time favorite things I look forward to are summer blockbuster movies.

The Future of Authentication: Why Passkeys Are the Key to Stronger Security

As cyber threats continue to evolve, addressing cybersecurity challenges is more urgent than ever. Traditional passwords, long considered foundational to digital security, are increasingly vulnerable to sophisticated attacks like phishing and credential stuffing. With cybercriminals becoming more adept, businesses need more secure and reliable authentication methods. Enter passkeys – an innovative step forward in authentication technology.

On-Prem vs Cloud PAM: Which Should You Choose?

When deciding between an on-premises or cloud-based Privileged Access Management (PAM) solution, a cloud-based PAM solution is recommended because it is easier to manage, highly scalable and cost-effective. Continue reading to learn more about the differences between on-prem and cloud PAM, the pros and cons of each and the important factors to consider when choosing the right solution for your organization.

Guide to POA&M Management for DoD Contractors in 2025

As of the end of last year, DoD contractors have to start paying attention to CMMC, as the Final Rule for CMMC 2.0 is now in force. While the timelines for full CMMC 2.0 compliance have just started, the full compliance process will inevitably take time. There will be mistakes, gaps, and missed items along the way. The accepted way to handle these gaps is through the use of POA&Ms. What are POA&Ms, how do you use them, and what do you need to know for 2025 and beyond?

Are your AI Inference and GenAI Environments Secure? These Five Essentials Will Help

AI systems are quickly becoming critical elements of business technology. Imagine building an AI agent trained using your internal documents and guides to quickly improve customer experience, process loan applications, or provide tier 1 support to your customers. The potential is tremendous—but what happens if your models are trained using your own intellectual property like software code, customer data, or other sensitive information?

5 Steps to Securing AI Workloads

In the past year alone, the number of artificial intelligence (AI) packages running in workloads grew by almost 500%. Which is to say: AI is everywhere, and it’s settling in for the long haul. Naturally, as helpful as they are, these AI workloads come with security challenges, including data exposure, adversarial attacks, and model manipulation. So as AI adoption accelerates, security leaders must build an AI workload security program to protect their organizations while enabling innovation.

Sinister SQL Queries and How to Catch Them

SQL Server is more than just a database—it's a powerful platform that can be leveraged by attackers for system access, persistence, and code execution. While organizations focus on protecting their valuable data, they often overlook the inherent capabilities within SQL Server that make it an attractive target for adversaries looking to establish footholds in Microsoft environments.

Enhancing Kubernetes Security: Strategies for Effective Secrets Management

Kubernetes powers modern application deployments, yet safeguarding its secrets remains a formidable challenge. In a 2024 report, IBM estimated that 16% of data breaches stemmed from compromised credentials, resulting in significant financial losses. The recent attack involving a stolen API key at the U.S. Treasury Department highlights the vulnerability of even well-protected systems.