Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Ransomware: AI changes the writer. It doesn't change the math.

Ransomware: AI changes the writer. It doesn't change the math. Why most endpoint protection still treats ransomware as just another piece of malware, and what changes when you watch the data instead of the attacker. In 2013, CryptoLocker introduced the modern ransomware playbook. It also introduced something most of the industry has still not come to terms with: remote encryption.

GPT-5.5-Cyber is here. What it means for defenders operating at the frontier.

GPT-5.5-Cyber is here. What it means for defenders operating at the frontier. OpenAI’s May 7 release of GPT-5.5 and the limited preview of GPT-5.5-Cyber put frontier AI in verified defenders’ hands. As a member of the Trusted Access for Cyber program, Sophos is using these models to sharpen what we already operate: an agentic SOC that resolves more than half of cases without a human, and an endpoint architecture purpose-built to stop AI-generated zero-days.

Why You Shouldn't Use LLMs to Generate SQL (Security Risks)

“Just let the LLM write the SQL.” It sounds powerful. A user types a question in plain English, the model generates a query, the system runs it against the database, and the answer comes back. No SQL knowledge required. No BI tools. No waiting for the data team. It works beautifully in demos. And it is a serious engineering mistake in production. Direct SQL generation from LLMs combines two things that should never be combined: untrusted code generation and privileged execution.

How Aurora Vulnerability Management Unifies Visibility, Prioritization & Remediation

With Arctic Wolf Aurora Vulnerability Management, organizations can monitor their risk score, gain comprehensive visibility, prioritize vulnerabilities and remediate risks with options including patch management and ITSM integrations.

How to Gain Visibility and Reduce Exposure with Aurora Attack Surface Management

This demo will illustrate how Aurora Attack Surface Management builds a continuously updated attack surface inventory, correlates asset and exposure data from multiple sources, and identifies gaps in security controls. It enables prioritization and remediation verification so that organizations can focus on what matters most and effectively drive risk reduction.

Acronis Cyber Frame - Setting up VPN connection to your local site

Learn how to connect to Acronis Cyber Frame virtual machines and set up a secure site-to-site VPN using strongSwan. This video walks you through network setup, router configuration, VPN policies, endpoint creation, and testing connectivity between Cyber Frame and your local site.

How Corelight identified a years-old network issue in 30 minutes

A global cruise line operating across maritime and resort environments was struggling with inconsistent detections, alert overload, and limited visibility from its existing NDR platform. In this customer story, Jay Miller from Corelight walks through how the organization evaluated its network visibility strategy, identified long-standing gaps in detection coverage, and improved investigation workflows across a complex environment with intermittent connectivity at sea.

Fireblocks CEO Michael Shaulov on NYSE Live: Powering Western Union's USDPT Stablecoin

Fireblocks Co-Founder and CEO Michael Shaulov joined NYSE Live to discuss the partnership powering Western Union's first stablecoin, USDPT, and what it signals for the next wave of institutional digital asset adoption. In this conversation with NYSE's Ashley Mastronardi, Michael covers: Fireblocks supports $14T+ in digital asset transactions across 150+ blockchains and powers the infrastructure behind payment giants, banks, and exchanges modernizing how money moves.