Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

AI Agent Security Framework for Cloud Environments

Your security team has done the homework. You’ve built a risk taxonomy covering agent escape, prompt injection, tool misuse, and data exfiltration. You’ve mapped those threats against your agent architecture’s seven layers. You’ve classified your agents by autonomy level — separating read-only chatbots from fully autonomous workflow agents that can book meetings, modify databases, and invoke other agents. The risk assessment is thorough.

What is email threat prevention? A complete guide in 2026

Email Security Email Security Stop modern email-borne attacks with real-time AI defense. Please wait, this may take a few seconds... Email threat prevention is a comprehensive security technique that identifies, blocks and neutralizes email threats such as phishing, malware, and business email compromise (BEC) before they reach a user’s inbox. It combines multiple layers of defense, including AI-driven analysis, URL scanning, attachment sandboxing and authentication protocols like DMARC.

How to Scale as an MSP by Combining Firewalls and Integrated Security Services

Scaling MSP business has become increasingly complex in a landscape where threats evolve rapidly, and emerging technologies are constantly expanding the attack surface. According to the World Economic Forum’s Global Cybersecurity Outlook 2026, 61% of organizations identify the rapid evolution of the threat landscape and emerging technologies as the primary challenge to strengthening cyber resilience. In addition, 77% of respondents have observed a widespread increase in online fraud and phishing.

What Tools Do Hackers Use to Weaponize Emails?

Email attacks have become one of the key ways for hackers to target organizations and individuals. The sheer number of tools available has made it easier than ever for non-technical cybercriminals to launch sophisticated cyber attacks. As a result, many resources are available for each stage of the kill chain – from reconnaissance to delivery to weaponization. This article focuses on the second stage of the cyber kill chain – weaponization.

Fake Calendar Invitations Move to Microsoft Outlook

Fake calendar invites have been a problem on Gmail for years. Even though they could appear on other calendar services, I hadn’t seen or read about a lot of it. Gmail had been taking the brunt of the fake calendar invites. However, I got a scam Microsoft Outlook calendar invite recently, and other Outlook users are complaining more as well. So, what was previously happening mostly in Gmail has now moved over to Outlook, too. I am a busy guy.

Data Loss Prevention (DLP): What It Is, Types, and Solutions

Most data breaches don’t happen because systems fail. They happen because people make routine errors. Attackers know this, which is why social engineering has become the dominant attack vector, exploiting everyday actions like emailing files or responding to messages. Today, 70–90% of successful cyber attacks involve social engineering, resulting in data exposure that technical safeguards can’t intercept.

New A0Backdoor Linked to Teams Impersonation and Quick Assist Social Engineering

BlueVoyant Security Operations Center (SOC) and Threat Fusion Cell (TFC) continue to track an activity cluster that uses email bombing and IT-support impersonation over Microsoft Teams to obtain Quick Assist access, then pivot to a deeper attack. This research shows that once on the victim’s host, the actors sideload a malicious DLL to deliver a new backdoor BlueVoyant has dubbed the A0Backdoor.

Daniel dos Santos on defending against opportunistic cyberattacks

Complicated, targeted attacks aren’t the only methods you should be on the lookout for. Security fundamentals are important for defending against opportunistic that can cause chaos! On this episode of Data Security Decoded, Daniel dos Santos (VP of Research, Forescout Technologies) and host Caleb Tolin explore attacker motivations, common entry points, and what defenders must prioritize now. Listen to the full episode on our YouTube channel, or wherever you get your podcasts.

EP 26 - The tyranny of the now: identity at machine speed

Security teams are under more pressure than ever, reacting at human speed while systems, identities, and AI agents operate at machine speed. In this episode of Security Matters, host David Puner sits down with cybersecurity leader and former FBI executive MK Palmore to explore why defenders struggle to keep pace and what it takes to regain control.

Understanding the ENS Framework: A Guide to Spain's National Security Framework

As governments continue to digitize services, the number of systems that support public administration continues to grow. With this expansion comes greater cybersecurity risk. To address these risks, Spain established the Esquema Nacional de Seguridad (ENS), a national framework designed to protect information systems used by public sector organizations. ENS defines the security requirements that ensure government systems remain secure, reliable, and resilient.