Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The hidden cost of manual capacity management

For most IT operations teams, capacity management is a balancing act. Too much capacity and costs spiral; too little and users feel the impact before you do. On paper, scaling should be simple. In reality, it’s anything but. Most teams still scale manually – waiting for alerts, logging into consoles, adjusting resources, and hoping they’re not overdoing it. It’s a pattern that feels safe because it’s familiar, but it’s quietly expensive.

The researcher's desk: CVE-2025-59287

Welcome to The researcher’s desk – a content series where the Detectify security research team conducts a technical autopsy on vulnerabilities that are particularly interesting, complex, or persistent. The goal here is not to report the latest research (for which you can refer to the Detectify release log); it is to take a closer look at certain vulnerabilities, regardless of their disclosure date, that still offer critical lessons.

Art and Science: Cyber and Physical Security Convergence Deficiencies in the Louvre Heist

In eight short minutes on October 25, 2025, a group of thieves captured the world’s attention and imagination, perpetuating a daring heist in broad daylight and escaping with approximately €88 million worth of prized artwork from the planet’s most visited museum: The Louvre. Within the security community, the first successful robbery from the iconic Parisian landmark since 1998 was a bombshell story.

Microsoft Issues Emergency Patch for Windows Server Update Services RCE Vulnerability CVE-2025-59287

LevelBlue Labs is tracking a severe vulnerability in Windows Server Update Services (WSUS), CVE-2025-59287, that allows attackers to remotely execute code without authentication and is being exploited by threat actors to compromise vulnerable Windows Server users.

New Android Malware Platform Targets Bank Accounts

Researchers at Zimperium are tracking a new malware-as-a-service platform designed to target Android phones with banking Trojans. The platform, dubbed “Fantasy Hub,” allows unskilled threat actors to launch sophisticated malware campaigns that trick victims into granting access to their bank accounts.

Azure DevOps Pipelines 101: A Beginner's Guide to CI/CD

In software engineering, the deployment process is not just about running a script and hoping it sticks. A big part of it is automation, not as a luxury, but a necessity. And that’s where Azure Pipelines steps in. The software provides a robust CI/CD engine embedded in the Azure DevOps ecosystem. Developers and DevOps engineers working with version control systems, containers, or even legacy monoliths can leverage Azure Pipelines.

Operationalizing Digital Asset Custody Compliance for Banks

For the first time in history, banks and financial institutions are adopting digital assets as an integral part of their internal operations and product offerings. As they do so, they face new threat vectors, unfamiliar custody models, and growing pressure to identify and align with emerging supervisory standards, which may or may not serve as complete safe havens from risk.

Building human-centric SOCs in the age of AI automation with Alec Fenton

Defender Fridays - Building human-centric SOCs in the age of AI automation with Alec Fenton Join us for this week's Defender Fridays as we explore the evolution of security operations and AI's role in empowering analysts with Alec Fenton, VP Security Operations at Foresite Cybersecurity. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

How IT Security Consultants Help Scale-ups Prevent Data Breaches

There's something peculiar about scale-ups: they grow fast enough to attract attention but rarely fast enough to build proper defenses. Ransomware showed up in 44% of breaches last year, and human error caused 95% of them. The pattern repeats itself: companies hit Series A funding, suddenly they're handling enterprise client data, and security becomes an afterthought until something breaks.