Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Threat Modeling Checklist for Mobile App Development

As mobile apps become increasingly central to business operations and user engagement, securing them from design to deployment has never been more critical. Threat modeling offers an essential first step in identifying and mitigating potential security risks early in the development process. It helps you think like an attacker, spotting weaknesses before they can be exploited.

The Worsening Landscape of Educational Cybersecurity

Last year, KnowBe4's report "Exponential Growth in Cyber Attacks Against Higher Education Institutions" illustrated the growing cyber threats facing universities and colleges. The report highlighted the perfect storm of factors making educational institutions prime targets: vast data repositories, open networks, limited security resources, and decentralized governance structures.

New Unrestricted AI Tool Can Assist in Cybercrime

Researchers at Certo warn that a new AI chatbot called “Veniceai” can allow cybercriminals to easily generate phishing messages or malware code. The tool, which only costs $18 per month, is growing in popularity on criminal forums. “One of the starkest contrasts between Veniceai and more mainstream AI systems like ChatGPT is how each responds to harmful or malicious requests,” Certo says.

AI Applications in Cybersecurity with Adam Winston - The 443 Podcast - Episode 331

This week on the podcast, recent guest Adam Winston hops back on to continue our discussion on Artificial Intelligence in cybersecurity. This week, we focus on how attackers are using AI, what to worry about and what not to lose sleep over, and guidance for evaluating AI for use within your own organization. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Introducing Salt Illuminate: API Security That Works in Minutes, Not Months

APIs are the backbone of modern business. They connect services, power user experiences, and enable innovation at breakneck speed. But they’ve also become one of the largest, most complex threat surfaces out there—and traditional security approaches just aren’t cutting it. At Salt Security, we’ve spent years pioneering API protection. And today, we’re thrilled to announce our biggest leap forward yet. Meet Salt Illuminate.