Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Five Small Steps to Prevent Your Data From Being Put at Risk

This Digital Cleanup Day, take control of the clutter that could be putting your data at risk. Old accounts, reused passwords, unsecured files and other bad cyber habits create easy entry points for cybercriminals – and most people don’t realize how exposed they are until it's too late.

CanisterWorm: The Self-Spreading npm Attack That Uses a Decentralized Server to Stay Alive

On March 20, 2026 at 20:45 UTC, Aikido Security detected an unusual pattern across the npm registry: dozens of packages from multiple organizations were receiving unauthorized patch updates, all containing the same hidden malicious code. What they had caught was CanisterWorm, a self-spreading npm worm deployed by the threat actor group TeamPCP. We track this incident as MSC-2026-3271.

Top Tech Talent Sourcing: Identifying the Best IT Recruitment Agencies in Poland 2026

The landscape of technology recruitment in 2026 has become increasingly complex. As remote work and hybrid models have matured, the competition for elite software engineers, DevOps specialists, and AI researchers in Poland has reached unprecedented levels. For international companies looking to establish or scale their technical teams in Central Europe, the challenge is no longer just finding talent-it is about engaging and securing the right talent. This environment has elevated the role of specialized recruitment partners from simple vendors to strategic consultants. To succeed, businesses must be able to identify which partners truly understand the nuances of the Polish developer community and the technical demands of modern software architecture.

WatchGuard: WatchGuard + HaloPSA: Alert to Invoice for MSPs

MSPs need security operations that align with their way of working in the PSA they love, with the right context and minimal manual effort. In this session, we show how the WatchGuard Cloud integration with HaloPSA embeds unified security operations directly into the Halo experience, giving technicians the device, license, and event context they need exactly where work is executed.

Top tips: Protecting your data when the world feels unpredictable

Top tips is a weekly column where we highlight what’s trending in the tech world and share ways to stay ahead. This week, we’re taking a moment to think about something that often gets overlooked. When the world feels unpredictable, our routines change. We rely more on our devices to stay connected, informed, and reassured.

From Scanner to Stealer: Inside the trivy-action Supply Chain Compromise

While investigating a spike in script execution detections across several CrowdStrike Falcon platform customers, CrowdStrike’s Engineering team traced the activity to a compromised GitHub Action named aquasecurity/trivy-action. This popular open-source vulnerability scanner is frequently used in CI/CD pipelines.

Has AI structurally changed the cyber industry forever? #cybersecurity #podcast #ai

On this week's episode of The Cybersecurity Defenders Podcast, Stel Valavanis, founder of onShore Networks, argues that AI is a significant milestone but does not change where security is headed. He puts AI alongside the Internet and TCP/IP and makes the case that the path forward is clear: fully embrace it as a tool, regardless of which side of the equation you are on. He also points out that agentic and automated AI was already being deployed well before LLMs arrived.

Data visibility must be continuous to keep data security manageable #datasecurity #netwrix

Sensitive data no longer lives in one place. It moves across file servers, SaaS apps, cloud platforms, and collaboration tools. That’s why discovering sensitive data once is not enough. In this video, Farrah Gamboa, Senior Director of Product Management at Netwrix, explains why data visibility must be continuous to keep data security manageable.