Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

BlackSuit Ransomware: The Royal Evolution That's Targeting Everyone | Cyber Threats Exposed 1

Think you know ransomware? Think again. BlackSuit isn't just another encryption threat—it's an evolved monster that's putting both Windows AND Linux systems at serious risk. In this episode of our cybersecurity series, we break down.

Built for the agentic era: Meet the Vanta MCP Server

The way developers interact with tools is changing fast. Language models like Claude and ChatGPT, and IDEs like Cursor and Windsurf are much more than assistants and environments—they’re powerful interfaces for interacting with enterprise data. ‍ At Vanta, we envision a world where compliance workflows can shift left to meet GRC teams and developers where they already are. By launching the Vanta MCP Server, we’re making that vision real.

Shadow AI leak exposes data from 571 Canva Creators #ai #cybersecurity #dataleak #vendor #vendorrisk

571 Canva Creators had their personal data exposed by an unsecured Chroma database. The database, used by Russian AI startup My Jedai, contained 341 document collections. One of these collections included survey responses with emails, countries of residence, and detailed feedback on the Canva Creators program. This isn’t your typical breach. It’s the result of unsecured AI infrastructure.

Warning: Crooks Are Using Vishing Attacks to Compromise Salesforce Instances

A criminal threat actor tracked as “UNC6040” is using voice phishing (vishing) attacks to compromise organizations’ Salesforce instances, according to researchers at Google’s Threat Intelligence Group. After gaining access, the attackers exfiltrate the victim’s data and hold it for ransom.

What is AI Red Teaming?

AI red teaming is the process of simulating adversarial behavior to test the safety, security, and robustness of artificial intelligence systems. It draws inspiration from traditional cybersecurity red teaming (where ethical hackers emulate real attackers to expose flaws) but applies that mindset to machine learning models, data pipelines, and the broader AI stack.

SSO can't secure every identity

This blog has been adapted from a section of 1Password’s ebook: Why SSO is not enough for identity security. To read the complete ebook, click here. Single sign-on (SSO) solutions are designed to manage and secure access to SaaS applications. By integrating with a company’s identity provider (IdP), SSO allows teams to authenticate an identity to multiple applications via a single log-in.