Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Honoring Dave Täht and his contributions to a better Internet (video calls included)

Dave Täht died this week (August 11, 1965 – April 1, 2025), and Tom Strickx, Principal Network Engineer at Cloudflare, honors his contributions to help build a better Internet. Dave Täht was an American network engineer, musician, lecturer, asteroid exploration advocate, and Internet activist. Without his work, FQ-CoDel wouldn't exist — and low-latency networking, from Wi-Fi to Starlink and video calls, would likely be worse today.

What is IoT Security?

Security measures aren’t keeping pace with the rate at which new technology is going to market. One of the fastest-growing segments of technology, the Internet of Things (IoT) — which includes webcams, smart thermostats, wearable health trackers, and other smart objects — is capturing the industry’s attention and growing rapidly. By 2030, the number of connected IoT devices is expected to grow to 40 billion.

Put AI to work where workflows work best

In this guest post, Jason English, Director and Principal Analyst at Intellyx explores how GenAI is moving beyond chat to orchestrate real action for SOC teams. As my colleague Eric Newcomer mentioned in the previous chapter of this series, GenAI changes the security automation game, with multi-system discovery, documentation, and task execution capabilities that can reduce cognitive load and toil for security analysts.

API Attacks Up 150% - Here's Why You Should Care Now #APISecurity #APIAttacks #AIVulnerabilities

Even worse, 98.9% of AI vulnerabilities are tied to insecure APIs.. APIs are being discovered in under 30 seconds, according to Wallarm’s honeypot research. Weak authentication, broken access controls, and missing rate limits are opening the door. Now’s the time to take API security seriously. Learn how to protect your systems before it’s too late.

Unmasking EncryptHub: Help from ChatGPT & OPSEC blunders

This is the second part of Outpost24’s KrakenLabs investigation into EncryptHub, an up-and-coming cybercriminal who has been gaining popularity in recent months and is heavily expanding and evolving operations at the time of writing. We’ve already published one article explaining EncryptHub’s campaigns and TPPs, infrastructure, infection methods, and targets.

Does Cloud Backup Protect Against Ransomware?

As of 2024, 75 active ransomware groups targeted healthcare industries, businesses, and individuals with the aim of threatening these individuals with data loss or leaks in return for large payouts to decrypt this data. Many security organizations and cybersecurity experts are fighting to prevent ransomware from becoming common. One question on the minds of many people related to this topic is: Does cloud backup protect against ransomware?

Your Quick Start Guide to Online Panel Communities

There's nary an enterprise of any size in the world that would even think about planning a business strategy without market research. To do this would be to "fly blind" in a cutthroat environment riddled with competitors. And to stay competitive, probably the best thing any enterprise can do is to stay very closely in touch with its customers. There's an unquestionable need to keep up with customers' constantly changing preferences as regards their shopping behaviour, the media they consume or use to communicate, and how they feel about the brand of the enterprise in question.

How Drones Are Revolutionizing Construction Site Management

Discover the method to save time and money while protecting workers on construction sites? Recent years have seen drones bring about complete transformation to construction site management practices. Construction drones perform tasks which include land surveying, project monitoring and ensuring worker safety. Construction companies have traditionally resisted adopting modern technological advancements. But drones? The construction sector has accepted drones with the enthusiasm of someone savoring a refreshing cold beverage when it's sweltering outside.

Is Your Google Cloud Secure Enough? 7 Must-Have Security Layers You Might Be Missing

As organizations migrate more data and operations to Google Cloud, one question becomes critical: is your cloud truly secure—or just secure enough to feel safe? As a dedicated Google SecOps partner, Cybriant focuses exclusively on the Google SecOps technology stack. Our commitment to this ecosystem means we are constantly sharpening our domain expertise to deliver smarter, faster, and more effective solutions.

Securing APIs Across Their Entire Lifecycle with AppSentinels

APIs are the digital arteries of modern business. They power apps, connect services, and drive innovation. But with this explosion in API usage comes a stark reality: APIs are also the attack vector today. As APIs evolve from design to deployment—and ultimately to deprecation—so do their security risks. Yet most organizations rely on fragmented, point-in-time solutions that leave dangerous gaps. At AppSentinels, we believe there’s a better way: Full Lifecycle API Security.