Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Healthcare Ransomware Recovery: A HIPAA-Compliant Response Framework

Healthcare remains the most targeted sector for ransomware attacks, with 238 ransomware incidents reported to the FBI in 2024 alone. The Change Healthcare attack demonstrated the cascading impact a single breach can have across the entire healthcare ecosystem, affecting payment processing for providers nationwide and ultimately compromising data on an estimated 190 million individuals.

Emerging Risks: Typosquatting in the MCP Ecosystem

Model Context Protocol (MCP) servers facilitate the integration of third-party services with AI applications, but these benefits come with significant risks. If a trusted MCP server is hijacked or spoofed by an attacker, it becomes a dangerous vector for prompt injection and other malicious activities. One way attackers infiltrate software supply chains is through brand impersonation, also known as typosquatting—creating malicious resources that closely resemble trusted ones.

PCI DSS Penetration Testing Requirements Explained

Overall, PCI DSS 4.0.1 is a set of 12 requirements distributed over six goals as a security standard for credit cards and debit cards. Not having proper documentation, poor protocols, or insufficient penetration testing may be among the reasons as to why PCI DSS audits fail.

Facebook tech support scams on the rise: How cybercriminals are turning your feed into a trap

From fake ads to tech support fraud, see how scammers exploit Facebook and how to protect your data and money. Facebook may feel like a safe place to connect, but scammers are increasingly using its ads, posts, and messages to deceive users. Here’s how cybercriminals are turning your feed into a gateway for fraud and what you can do to stay protected. When you open Facebook, you might expect birthday alerts, travel snapshots, or quick messages with friends.

When Your AI Agent Goes Rogue: The Hidden Risk of Excessive Agency

In Oct 2025, a malicious code in AI agent server stole thousands of emails with just one line of code. The package, called postmark-mcp, looked completely legitimate. It worked perfectly for 15 versions. Then, on version 1.0.16, the developer slipped in a tiny change. every outgoing email now included a hidden BCC to an attacker-controlled address. By the time anyone noticed, roughly 300 organizations had been compromised. Password resets, invoices, customer data, internal correspondence.

How the future of privilege is reshaping compliance

If privilege has changed, compliance can’t stay static. As organizations accelerate digital transformation, the compliance landscape is shifting beneath their feet—especially when it comes to how privileged access is controlled and proven. Regulatory requirements are multiplying, audit cycles are tightening, and the definition of privileged access has quietly expanded beyond people to workloads, automation, and AI-driven systems.

CyberArk named overall leader in 2025 KuppingerCole ITDR Leadership Compass

KuppingerCole has recognized CyberArk identity threat detection and response (ITDR) as a leader across all categories: overall, product, innovation, and market in its 2025 KuppingerCole Leadership Compass for Identity Threat Detection & Response.

Security Embedded In Your Data #Protegrity #datasecurity #cybersecurity #datacentric

Move beyond outdated security models that focus on protecting data infrastructure rather than the data itself. By embedding protection that travels with the data, you create a deterministic environment where data knows its own purpose and enables innovation at scale. Visit Protegrity.com to learn more.

How to Measure Configuration Drift (And Why Alerts Get Ignored)

Configuration drift isn’t just “change.” It’s unmanaged change. Let's get practical about how teams should actually measure drift: ⇢ What type of change occurred⇢ How often those changes happen⇢ How critical they are in real context⇢ And—most importantly—how teams respond Volume alone isn’t the metric that matters. If changes pile up without response, alerts get ignored—and drift quietly becomes exposure.