Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

How Banks and Financial Institutions Can Effectively Manage Third-Party Vendor Risks

While financial institutions enjoy many benefits from cooperating with third-party service providers, this cooperation also raises significant concerns regarding the security of the data and resources these vendors have access to. In this article, we discuss why financial institutions hire independent contractors and what cybersecurity risks this cooperation entails. We also explore how building a third-party vendor risk management program can help you mitigate these risks.

Supply Chains Under Siege: Inside the Cyber Threats on Manufacturing

In its 2025 State of the Underground report, Bitsight TRACE identified the manufacturing sector as the most targeted industry for the third consecutive year, accounting for 22% of the 4,853 cyberattacks where sector attribution was possible. Manufacturing is the backbone of global supply chains, and when a cyberattack halts operations, even just briefly, the ripple effects can be enormous. Production delays, missed shipments, and service disruptions quickly cascade across industries.

The Continuing Threat of Cyberattacks on Healthcare

The current trends in healthcare technology adoption present an interesting dynamic. Healthcare systems globally have been and continue to experience rapid digital transformation to the point where we now see increasingly embracing AI, internet-connected medical devices and telehealth solutions. Trustwave SpiderLabs captured what is taking place in its recent report Cybersecurity Challenges for Healthcare in 2025.

Cato CTRL Threat Research: Oyster Malware Loader Targets Tech-Savvy Users with Smarter Techniques During Summer Malvertising Campaign

Summertime in the U.S., Europe, and many other regions typically falls between June and September. Tech teams, admins, and even their bosses take vacations. Inboxes slow down, and production systems finally get a breather. But for the threat actors behind Oyster, while others were reaching for sunscreen or enjoying real sea fishing, they launched their own phishing campaign using something far more effective than email and sharpened their hook.

Oracle Kubernetes Engine Backup: A Complete Protection Plan

Oracle Kubernetes Engine backup requires a solid strategy that covers both applications and infrastructure. Oracle OKE handles orchestration well, but data protection remains your responsibility. A cluster failure or misconfigured setting can wipe out critical data and cause hours of downtime. This guide shows you how to build effective backup systems for your OKE environments.

To the Point: 11th Hour No More - How Fulton County Beat the Windows 11 Clock

With Microsoft officially ending support for many Windows 10 versions on October 14, 2025, public sector organizations are racing to modernize their environments. But Fulton County, Georgia, isn’t racing—they’re leading. In this episode, we sit down with Terrence Slaton, CISO of Fulton County, to unpack how his team successfully executed a large-scale migration to Windows 11 across critical government systems—with speed, certainty, and zero disruption to essential services.

Your AI Could Hack You #cybersecuritytips

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Scattered Spider's New Telegram Channel: A Rapid Fire of Leaks, Claims and the Return of Cloud-era Data Thefts

In early August 2025 a new Telegram channel emerged presenting itself as an amalgam of three well-known cybercriminal labels Scattered Spider, ShinyHunters and LAPSUS$. Within 24 hours the channel published a steady stream of claims, partial data dumps and screenshots tied to a wide range of incidents, including retail and luxury brands, government entities, and cloud-platform related breaches. The channel’s activity revived public attention on several overlapping trends.

Bridging the Execution Gap in Cybersecurity: From Data to Decisions

Many cybersecurity teams today suffer from what experts call the execution gap—a disconnect between gathering intelligence and taking timely, effective action. Instead of empowering action, disconnected dashboards and alert overload often leave teams overwhelmed. To close this gap, industry must evolve from generating alerts to enabling decisions. The execution gap refers to the struggle teams face in turning overwhelming visibility and data into structured, prioritized response.