Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Inside Protecto: The Technology Powering Context Security for AI

In this video, we take you under the hood of Protecto’s technology stack and show how it powers context-aware security for AI—while hiding the complexity behind simple APIs. At the core are two intelligence layers: You’ll also see how Protecto’s DeepSight engine, entropy-based tokenization, secure vault, and inference-level APIs deliver enterprise-scale security, compliance, and auditability. Protecto enables enterprises to safely unlock their data for GenAI, copilots, and Agentic workflows — without leaks, oversharing, or loss of AI capability.

8 fundamental AI security best practices for teams in 2025

Organizations worldwide are increasingly developing or implementing AI-powered tools to streamline operations and scale efficiently. However, the benefits come with unpredictable risks unique to AI that need to be mitigated with the right safeguards. ‍ One of the biggest AI security challenges is the lack of formalized oversight. According to Vanta’s State of Trust Report, only 36% of organizations have AI-informed security policies in place or are in the process of building them.

Notepad++ DLL Hijacking (CVE-2025-56383): CVSS 8.4 or CVSS 0.0?

A vulnerability on a popular source-code editor has been recently released along with a proof-of-concept (POC) exploit, but the security community isn’t so sure that it’s a legitimate flaw. In this article, we look at CVE-2025-56383, discuss what developers are saying in the wild, and provide our experts’ take on the issue.

Salesforce Extortion Accelerates With New Leak Site

For months now, journalists and cybersecurity experts, including UpGuard, have been following the movements of the hacker collective “Scattered Lapsus$ Hunters,” a sort of supergroup of the already well-known cybercriminal entities ShinyHunters, Scattered Spider and Lapsus$. Now, this collective has launched a website where they can extort payment from entities in return for delisting and deleting their data.

6 Ways to Make Your Risk Assessments Land With Stakeholders

As businesses expand, so do their lists of third-party vendors—and with them, the number of risk factors and complexity. This increase means that security analysts are often overwhelmed by a growing number of vendor risk assessments. However, completing an assessment alone isn’t enough; its value depends on how effectively the results are communicated.

Penetration Testing Metrics That Matter

Running a penetration test is only half the battle. The real challenge is translating complex technical findings into insights that leadership can act on. The right metrics do not just highlight vulnerabilities; they tell a story about risk, resilience, and readiness. In this guide, we explore the penetration testing metrics that truly matter and how to present them in a way that resonates with decision-makers.

Alleged Cl0p Extortion Emails Linked to July 2025 Oracle E-Business Suite Vulnerabilities

On October 2, 2025, Oracle announced that some Oracle E-Business Suite (EBS) customers had received extortion emails. Oracle’s investigation revealed the potential use of vulnerabilities previously addressed in the July 2025 Critical Patch Update. The following nine vulnerabilities in EBS products were addressed in the July update. These vulnerabilities range from medium to high severity, with three potentially exploitable by remote, unauthenticated threat actors.

Strengthening Your Digital Defences: A Modern Approach to Identity Protection

Passwords remain one of the most common ways to protect digital accounts, yet they are also among the weakest points of failure. Many breaches today are not caused by complex malware, but rather by simple human habits, such as reusing the same login credentials across multiple platforms. To stay secure, individuals and businesses must understand what makes an effective password, how to respond to breaches, and what additional measures should be taken to reduce exposure. This article explains practical steps you can adopt immediately, supported by data and expert resources.