Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SecurityScorecard CISO Steve Cobb as Cyber Santa's 2025 Naughty and List 2025

AI dominated headlines this year and threat actor groups made bold moves in 2025. From threat actors like Imperial Kitten and scammers using tools like Sora AI to mimc real human voices to Congressional action on the PILLAR act and a $50 billion rural healthcare investment from the U.S. government, there are a lot of moments this year that make up Cyber Santa's Naughty and Nice List for 2025.

Modern Exposure Management Is About Outcomes, Not Alerts

Modern exposure management has evolved beyond vulnerability scanning and alert volume into a discipline focused on measurable risk reduction. As the exposure management market matures, security leaders are adopting cyber exposure management platforms that unify signals across vulnerability, cloud, application, and attack surface tools to prioritize what truly matters.

Secret Scanning: A Critical Practice for Protecting Sensitive Data in Code

With the rise of CI/CD pipelines, cloud-native development, and globally distributed teams, sensitive credentials like API keys, tokens, and database passwords often slip into source code. Sometimes accidentally, sometimes under pressure to deploy fast. This is not a rare mishap. A recent study found that 34% of API security incidents involve sensitive data exposure. And according to Cyble, over 1.5 million.env files containing secrets have been discovered in publicly accessible environments.

CVE-2025-66675: Apache Struts DoS Vulnerability Leads to Disk Exhaustion

A newly disclosed denial-of-service vulnerability, CVE-2025-66675, affects a wide range of Apache Struts 2 versions and poses a serious availability risk for applications that handle file uploads. While the EPSS score is 0.05%, indicating a low probability of exploitation in the next 30 days, the vulnerability still represents a high availability risk for exposed and unpatched environments.

Simplifying Identity Lifecycle Management With Keeper

Managing user access across the entire employee lifecycle has become increasingly complex for modern IT and security teams. From provisioning new hires and modifying existing permissions during role changes to quickly deprovisioning departing employees, organizations must maintain granular access controls without disrupting operations. To keep up with the growth of hybrid and remote work, modern Identity Lifecycle Management (ILM) is essential for organizations to mitigate identity-based security risks.

Building a Real-Time Multiplayer Chess Game Inside ChatGPT (Agents SDK)

In this clip from This Week in NET, Systems Engineer Steve James gives a hands-on demo of a real-time multiplayer chess game running inside ChatGPT, built with the Agents SDK and Cloudflare Workers. Beyond the demo, we talk about what developers can build today with AI agents — and why, given the pace of innovation, it’s genuinely hard to predict what applications and experiences will emerge in 2026.

The 12 Months of Innovation: How Salt Security Helped Rewrite API & AI Security in 2025

As holiday lights go up and inboxes fill with year-in-review emails, it’s tempting to look back on 2025 as “the year of AI.” But for security teams, it was something more specific – the year APIs, AI agents, and MCP servers collided across the API fabric, expanding the attack surface faster than most organizations could keep up. At Salt Security, we spent 2025 focused on one thing: defending the API action layer where AI, applications, and data intersect.

Mexico Unveils Its First National Cybersecurity Plan: A New Era of Digital Resilience

Mexico has taken a major step toward strengthening its digital defenses with the official unveiling of its first National Cybersecurity Plan, a landmark initiative that establishes the country’s first specialized policy framework for cybersecurity.

AIOps in the Cato SASE Platform: Using Predictive AI Networking to Shift from Reactive to Proactive IT

It was a quiet Monday morning until John, head of IT, opened his laptop and saw 424 new support tickets. Users across the office were reporting issues like “apps won’t load” and “internet not working.” After hours of investigation that stretched into the next day, the team traced the problem to a branch router overwhelmed by malformed DNS queries from a misbehaving IoT device.