Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

3 ways orchestration and automation enhance vulnerability management

When it comes to vulnerability management, time is critical - the longer a vulnerability goes unaddressed, the greater the risk. Security teams need efficient, reliable processes that don’t drain resources. For most teams, relying on human effort alone isn’t sustainable or scalable. This is why so many teams turn to workflow orchestration and automation.

Phishing Kit Abuses Open Graph to Target Social Media Users

Researchers at Cyble warn that a phishing kit is abusing the Open Graph (OG) protocol to target social media users. The Open Graph protocol, originally developed by Facebook in 2010, allows users to control the content preview that’s displayed when a link is posted on social media. The phishing kit, dubbed “OG Spoof,” abuses this feature to post malicious links that appear legitimate.

Phishing Attacks Increased by Nearly 200% in H2 2024

Phishing and malicious emails remained the primary vectors of infection during the second half of 2024, according to a new report from Acronis. “The number of email-based attacks detected in the second half of 2024 increased 197% compared to the second half of 2023, while the number of attacks per organization within the same time frame increased by 21%,” the report says.

Bybit Hacked: A Call to Action for Exchanges to Embrace Off-Exchange Settlement

Another major crypto exchange has fallen victim to a hack—this time, Bybit. While the full impact is still unfolding, one thing remains undeniable: storing assets in exchange wallets exposes traders to unnecessary risks. In today’s market, this risk is increasingly unnecessary and manageable, particularly with solutions like off exchange settlement.

Relax, you've got Rubrik in your corner!

With Rubrik Security Cloud, you’ll be unstoppable against cyberattacks. You can protect your data wherever it lives: across the enterprise, in SaaS applications, and in the cloud. You’ll also be able to continuously monitor data risks, and recover data and applications quickly. We take great pride in helping IT and security teams find peace of mind. With Rubrik, your team can rest easy knowing your data is secure and resilient.

How's that for a malicious Linkc, new group launches DLS

2024 saw data-leak sites (DLSs) for 72 extortion groups materialise. As of February 2025, Cyjax has identified DLSs for five new groups, as noted in recent blogs on extortion groups Kraken, Morpheus, GD LockerSec, and Babuk2. The fifth one to emerge goes by the name Linkc. Read on to find out what Cyjax knows so far about this new entrant into the data leak extortion scene.

CIO POV: Five Essential Themes Shaping the CIO's Tech Agenda

Technology is rapidly redefining how we live and work. As CIO at CyberArk, I often get asked about the themes and realities shaping today’s tech agenda. Some of them—I’m looking at you, AI—are shiny and hyped, while others are familiar and fundamental yet equally important. Here’s a look at five on the top of my list.

Cisco Research AI Inference Infrastructure Summit

Cisco Research hosted a virtual summit on AI Inference Infrastructure, bringing together researchers to explore challenges in this space. The summit includes presentations from university professors and students collaborating with the Cisco Research team, including Aditya Akella (UT Austin), Rachee Singh (Cornell University), Alexey Tumanov (GA Tech), and Neeraja Yadwadkar (UT Austin).

BDRSuite vs Proxmox Backup Server: Which Backup Solution is Right for You?

When it comes to protecting your Proxmox virtualized environments, selecting the right backup solution is crucial for ensuring data integrity, minimizing downtime, and optimizing recovery efforts. BDRSuite’s Proxmox Backup and Proxmox Backup Server (PBS) both offer reliable Proxmox backup solutions, but each has its unique features and advantages tailored to different needs.