Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Jailbreaking 101: How to Set Up Your iOS Device for Security Testing?

Mobile app security can’t afford surface-level assessments. To truly verify how apps handle compromise, security teams must venture deeper, and in the iOS world, that means jailbreaking. Jailbreaking an iOS device grants pentesters the access required to uncover weaknesses otherwise invisible under Apple's sandboxing model. By removing Apple’s built-in restrictions, testers gain deeper access to system files, APIs, and hidden behaviors that standard tools can’t expose.

Level Up Your Strategies for Cybersecurity Awareness Month

Cybersecurity Awareness Month is just around the corner, and it's time to plan your October campaign! While it's an exciting opportunity, it can also be challenging. How do you turn mandatory security awareness into a fun and engaging campaign that actually reduces human risk? Join Erich Kron, CISO Advisor at KnowBe4, as he shows you exactly how to do it. You'll discover how to leverage KnowBe4's ready-to-use kit to run a complete themed campaign throughout October.We've done the heavy lifting so you can focus on what matters most: building a stronger security culture that lasts.

From Anomaly to Insight: Using Behavioral Analytics to Spot Hidden Threats

The most dangerous attackers don’t break in—they walk through your front door with stolen credentials. Traditional security infrastructure faces a fundamental challenge: advanced persistent threats remain undetected for an average of 287 days, operating within legitimate access boundaries while signature-based defenses remain blind to their activities. When attackers steal credentials or insiders go rogue, they appear as authorized users to existing security infrastructure.

90 Days to SOC Autonomy: How Torq Customers Get There

Security operations shouldn’t be defined by burnout, backlog, and brittle tools. Torq HyperSOC replaces the slow, manual SOC model with an autonomous system powered by agentic AI, Hyperautomation, and seamless stack integration. In just 90 days with Torq, security teams move from reactive to proactive — automating Tier-1 triage, accelerating response, and freeing analysts to focus on what matters most.

Shai-Hulud: A Persistent Secret Leaking Campaign

On September 15, a new supply chain attack was identified that targeted the @ctrl/tinycolor and 150 other NPM packages. The attack scenario was similar to the one used in the s1ngularity and GhostActions campaigns. The threat actors combined a local environment secrets extraction with a malicious GitHub actions workflow injection in accessible projects. The compromised packages' structure has been detailed in blog posts by socket.dev and StepSecurity.

From Shadow IT to Shadow AI: The Evolution of Unseen Risk

Security leaders are well acquainted with Shadow IT; the unsanctioned apps, services, and even devices employees adopt to bypass bureaucracy and accelerate productivity. Think rogue cloud storage, messaging platforms, or unapproved SaaS tools. These all often slip past governance until they trigger a breach, compliance issue, or operational failure. Now, a more complex threat is emerging - Shadow AI.