Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Arctic Wolf Observes Organizations Receiving Unsolicited Microsoft MFA Messages

Arctic Wolf has recently observed customers receiving unsolicited Microsoft multi-factor authentication (MFA) text messages. These messages originate from legitimate Microsoft short code numbers; however, the source and intent have not been confirmed. This issue appears widespread, affecting organizations across multiple industry verticals. Example of Text Message It is currently unclear whether this activity is due to a systemic issue on Microsoft’s side or part of a malicious campaign.

Cyber Frontlines: Insights from DSEI Japan 2025

Modern conflict is no longer dominated solely by tanks, ships, and fighter jets. The nature of warfare itself has transformed dramatically. Today, battles are increasingly fought—and won—in cyberspace. Historically, military leaders intimately understood their hardware; pilots knew their planes, naval commanders knew their ships, and tank commanders knew their armoured vehicles.

Single Endpoint View - Tanium for Help Desk - Tanium Tech Talks #129

Tanium is known for its ability to get quick results from thousands of endpoints in a flash. But what about when I want to drill down for details on a single endpoint? What if it is offline? A few years ago we released what we simply call "single endpoint view". The response was huge, especially for help desk folks who need a quick glance at everything in one place. And the best part, is that you can customize it to your own needs.

EP 9 - J&J's former CISO on trust, identity, and the future of cybersecurity

In this episode of Security Matters, host David Puner sits down with Marene Allison, former Chief Information Security Officer (CISO) of Johnson & Johnson, for a candid and wide-ranging conversation on trust, identity, and leadership in cybersecurity. From securing global vaccine supply chains during the COVID-19 pandemic to navigating the rise of AI and machine identities, Marene shares hard-earned insights from her decades-long career in national security and the private sector.

Build Fast, Stay Secure: Guardrails for AI Coding Assistants

AI coding assistants like GitHub Copilot and Google Gemini Code Assist are changing how developers work — accelerating delivery, removing repetition, and giving teams back time to build. But speed isn’t free. Studies show that around 27% of AI-generated code contains vulnerabilities, not because the tools are broken, but because they generate code faster than most teams can review it. The result? A growing wave of insecure code is making it into production.

The EU AI Act: What MSPs Need to Know ?

The EU AI Act is the most comprehensive law in the world to regulate artificial intelligence. This law doesn’t just apply to organizations inside the European Union, it also affects anyone doing business with the EU or offering AI-powered services in that market. If you use AI tools like ChatGPT, Copilot, Jasper, or Bard for automation, reporting, or client communication, yes, then definitely this applies to you.

PCI 6.4.3 and 11.6.1: The Complete Guide to Stop E-Skimming

PCI 6.4.3 and 11.6.1 are critical requirements for protecting payment pages from JavaScript-based attacks in e-commerce. JavaScript powers modern e-commerce but also exposes sites to digital skimming attacks. Common threats include supply chain compromises, Magecart injections, and CDN breaches. To combat this, PCI DSS 4.0 mandates script management and tamper detection. Protecting your payment pages with real-time monitoring tools and client-side security is essential for compliance and customer trust.

Security Debt in Government Software: The Hidden Risk You Can't Ignore

When we think about software security risks, we often focus on immediate threats—new vulnerabilities discovered in the latest release or zero-day exploits making headlines. But beneath the surface lies a more insidious problem, especially in the public sector: security debt. This hidden risk accumulates quietly, but its impact can be severe, eroding the integrity, resilience, and trustworthiness of government software systems.