Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CVE-2025-66516: Critical XXE Vulnerability Exposes Apache Tika Deployments

A critical vulnerability, CVE-2025-66516 (CVSS 10.0), has been identified in Apache Tika, affecting how the framework processes PDF files containing XFA (XML Forms Architecture) data. The vulnerability resides in tika-core, which means any system using Tika’s default parsing behavior remains vulnerable even if the PDF parser module was previously patched. No special configuration or insecure application code is required; simply ingesting a malicious PDF is enough to trigger the exploit.

DLP Compliance Guide: Meeting HIPAA, GDPR, & PCI Requirements

Compliance and data protection are inseparable in today's digital-first world. With increasing regulatory scrutiny, expanding privacy laws, and growing customer expectations around data stewardship, organizations can no longer afford to treat compliance as a checkbox exercise.

Holding Tech Platforms Accountable for Online Gender Based Violence

Online abuse is now a major part of gender based violence. Many survivors experience harassment, stalking, threats or image based abuse through social media, messaging apps and other digital platforms. The UK’s Online Safety Act 2023 has created new rules for platforms, but real change only happens when survivor services, tech companies and the public all play their part.

The Top 5 Cyber Threats That Targeted Small Businesses in 2025

As we look back at 2025 and onward, there are five cyber threats that stand out as the most pressing for small businesses. No single solution eliminates cyber risk. The most effective strategy for small businesses is to combine multiple layers of defense. Endpoint security, email filtering, secure backups, and continuous education together create a much stronger posture than any one tool can provide on its own.

How strategic CISOs turn AI risks into competitive advantages

As the flurry of excitement over fresh AI innovation begins to fade, risk leaders, heads of GRC and CISOs have a new challenge to tackle. Regulators, customers, and boards are all asking harder questions about how AI is used, secured, and audited. For CISOs, AI governance is now a board-level expectation. Some organizations will be able to confidently show their measured and documented approach to AI governance.

Top 12 Privileged Access Management (PAM) Use Cases in 2026

Privileged Access Management (PAM) is your organization's security control center for managing and monitoring high-level access to critical systems. Think of it as a sophisticated vault system that safeguards your most powerful administrative credentials while maintaining detailed audit trails of their usage. As we head into 2026, PAM has become crucial. Here's why: Cyberattacks are getting scarier and more complicated.

Google Gemini 3 Pro Builds an App with ONE PROMPT...

Google announced Gemini 3 Pro, which they tout as their most intelligent model yet that's best for complex tasks and bringing creative concepts to life. We're going to put this model to the test and see how good it is at fulfilling our prompt with a production ready app and the security of the code it produces.

Why Every CEO Needs a CISO or CIO on the Board and How to Get a Board Seat if You Are One

As boards face AI risk, digital transformation, and evolving regulation, technical expertise has become essential. But when it comes to board seats, CISOs or CTOs are often underrepresented. Speakers Dr. Aleksandr Yampolskiy, Co-Founder and CEO of SecurityScorecard | Beth Stewart, Founder and CEO of Trewstar Corporate Board Services SecurityScorecard monitors and scores over 12 million companies worldwide.

How to Recognize Holiday Phishing Scams | The Eighth Day of Scam-mas

On the 8th night of Scam-mas, Hannah Klein almost fell for a Hanukkah online scam. See how Avast Scam Guardian blocks phishing links and protects personal data. Stay safe from holiday online scams this season! SUBSCRIBE to our Avast channel for more tips, updates, and advice: YouTube.com/Avast CHAPTER TIMESTAMPS: FOLLOW US.