Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Vanta Expands European Presence with New London Headquarters

London, UK - September 24, 2025 - Vanta, the leading AI-powered trust management platform, today announced the opening of its new London headquarters, marking a major milestone in the company's European expansion and reinforcing its commitment to building trust in technology across EMEA.

Enhancing the Git Restore Process with Azure DevOps and GitProtect

In this video, we will walk you through the new Git Restore process in GitProtect, highlighting its compatibility with platforms like Azure DevOps, GitHub, GitLab, and Bitbucket. We will explain how we can enhance the restore efficiency by using additional credentials and access tokens, allowing for more API requests. A key feature of Azure DevOps is the ability to restore repositories from the same backup set, ensuring consistency. I encourage you to add these additional credentials to GitProtect for a smoother experience.

From Ransomware to Exposed ATMs: How Adversaries Target Financial Institutions

The financial sector remains one of the most targeted industries for cybercriminals and nation-state actors due to the sensitivity of customer data, the high value of financial transactions, and the critical role these institutions play in global stability. Bitsight’s 2025 State of the Underground report found that underground markets listed nearly 14.5 million compromised credit cards in 2024, representing a 20% increase over 2023. This growth was driven entirely by a surge in US-issued cards.

Is your hybrid work as protected as you think?

The hybrid working model has blurred the traditional limit of corporate networks. With users accessing critical resources from remote locations, unmanaged networks and personal devices, attack surfaces have increased exponentially. This demands a cutting-edge, comprehensive and adaptive approach to security. A recent example in January 2025 makes this clear: a vulnerability in SimpleHelp - a remote access tool - let attackers compromise corporate endpoints and move laterally across the network.

Hypervisor Encryption: Shutting Down Recovery

Ransomware isn’t just about locking files anymore; attackers like Scattered Spider can take entire backup systems offline. Joe Hladik explains how hypervisor encryption lets them access virtualization interfaces and encrypt entire ESXi clusters, leaving organizations with no way to recover. Joe lays out why this tactic is so dangerous: it turns a backup, your last line of defense, into another point of failure.

When Firewalls Age Out: What the Akira Attack Can Teach Us About Lifecycle Security

Cyberattacks evolve faster than aging infrastructure can keep up, and expired hardware is one of the biggest blind spots organizations face today. The recent Akira ransomware campaign targeting SonicWall VPNs is a powerful reminder of what happens when devices slip out of support.