Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI-Generated Attacks: What are They and How to Avoid Them?

AI-generated attacks, such as social engineering, phishing, deepfakes, malicious GPTs, data poisoning, and more, are disrupting the current security landscape speedily. But there are ways to avoid them and strengthen our defences with miniOrange IAM solutions.

AI Adoption Is Outpacing Governance: Conversations on Managing AI Risk

Executives everywhere are under pressure to deploy AI fast — but our recent roundtable on AI risk, hosted by TEISS, revealed a growing concern: AI adoption is outpacing governance, and organisations are taking on more risk than they realise. While most enterprises have mature technical controls, many are missing visibility into how AI is being used — and by whom.

Secure WordPress Login with One Click | miniOrange SAML Single Sign On (SSO) Plugin

Managing multiple logins across your WordPress environment can be frustrating for both users and teams. The miniOrange SAML Single Sign On (SSO) Plugin eliminates password fatigue by allowing users to log in once and access everything they need. Connect your dashboard, store, forum, LMS, and more through one secure, seamless login experience, powered by SAML 2.0 and trusted Identity Providers like Google Workspace (Google Apps, Okta, Salesforce, Azure AD (Microsoft Entra ID), Keycloak, ADFS, Office 365, OneLogin, Auth0, PingOne, WordPress, Oracle, JumpCloud, CyberArk, and more.

Drupal Session Management - Login Restriction

In this video, we show you how the Login Restriction feature in our Session Management module works, helping you control who can access your site. You’ll learn how to secure your website by setting rules around where and when users can log in, using IP-based restrictions to allow logins only from specific IP addresses or ranges, country-based restrictions to limit access to users from selected countries, and time-based restrictions to control logins during specific hours or days. Watch the video to see step-by-step instructions and keep your site safe and secure.

Rethinking Passwords to Build a Cyber Strong Tomorrow

The reality is clear: passwords remain one of the most-targeted—and most vulnerable—gateways into business IT environments. As cyber threats increase and evolve, relying on outdated password practices simply isn’t enough anymore. This Cybersecurity Awareness Month, let’s modernize our approach and treat password security not as a checkbox, but as a cornerstone of effective cyber resilience.

Faster, Smarter, Autonomous: Cloud Security with Wiz + Torq

Torq AMP spotlights the partners redefining what’s possible in security operations. Each partner brings a unique strength that seamlessly extends Torq’s autonomous SOC platform. Together, these partnerships help SOC teams achieve speed, accuracy, and scale that were once out of reach. Explore the future of SOC in the AMP’d Sessions video series. Cloud has changed everything: how we build, how we deploy, and how attackers strike.

Advanced Banking Trojan Maverick Uses WhatsApp to Prey on Brazilian Users

The BlueVoyant Security Operations Center (SOC) and Threat Fusion Cell (TFC) researchers recently analyzed attacks of an adversary targeting users based in Brazil via WhatsApp. The attack lures users into downloading a zip archive. The zip archive contains a shortcut file (.lnk) which ultimately downloads and executes a banking trojan which BlueVoyant researchers have dubbed Maverick internally based off the naming convention used by the attackers.