Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cloud Intrusions Rise, eCrime Thrives, Governments Attacked: CrowdStrike 2025 Threat Hunting Report

In the first half of 2025 alone, cloud intrusions were up 136% compared to all of 2024. China was a big driver — CrowdStrike saw a 40% year-over-year surge in intrusions from suspected cloud-conscious China-nexus threat actors. In the government sector, interactive intrusions increased 71%, and targeted intrusion activity jumped 185%.

Using ITDR to Protect Non-Human Identities

Non-human identities. It seems like every technology conference that I’ve attended over the past year or so has had NHIs as a primary topic. And it’s no wonder. What have become powerful tools in the new world of hyper-automation, dynamic IT infrastructures, and complex security processes, have also led to new vulnerabilities within many IT environments. For just a moment, let’s look at why NHIs are important to focus on from a security perspective. I have 3 primary vulnerabilities.

Automating security questionnaires with open APIs: Trends in 2025

In this article Chief information security officers (CISOs) are continually tasked with understanding and deploying innovative solutions that reduce risk while increasing operational efficiency. As organizations expand their reliance on digital data and cloud-based infrastructures, the volume and complexity of security questionnaires have grown exponentially. In this environment, modernizing and streamlining these questionnaires is not simply about efficiency; it is a strategic imperative.

The Link Between Asset Classification and Threat Response Accuracy

The cybersecurity landscape continues to evolve at an unprecedented pace, with organizations facing increasingly sophisticated threats targeting their most valuable resources. In this environment, the accuracy and speed of threat response can determine the difference between a minor security incident and a catastrophic data breach. The fundamental truth: organizations cannot adequately protect what they cannot properly identify and classify.

Understanding Trustwave's Australia IRAP Assessment Services: A Comprehensive Guide

It's not news that keeping an organization's information and communication technology (ICT) systems safe and sound is absolutely critical. That's where the Information Security Registered Assessors Programme (IRAP), run by the Australian Signals Directorate (ASD), comes in. It’s an excellent programme and one that Trustwave highly recommends. To help organizations align with this process, Trustwave now has an IRAP Assessment Service available.

Framework Intelligence

Tired of spending hours reviewing vendor artifacts, policies, and questionnaires? Meet Bitsight Framework Intelligence—the AI-powered engine that transforms static compliance documents into structured, actionable insights. This capability, embedded in Bitsight’s Continuous Monitoring product, automatically parses vendor documentation, maps control evidence to frameworks like SIG Lite, NIST CSF, and ISO 27001, and generates audit-ready reports in just a few clicks.

Phishing Scams: How to Spot & Stop Video Call Attacks! #cybersecurity

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.