Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

CrowdStrike Showcases Cloud Security Innovation and Leadership at AWS re:Invent

As organizations accelerate their innovation in the cloud and their adoption of AI, securing AI workloads and identities has become critical. Misconfigurations, vulnerabilities and identity-based threats expose high-value assets to potential manipulation and exploitation. For AWS customers, advancing cloud security means establishing resilient guardrails that protect innovation without compromising speed.

CIS Control 10: Malware Defenses

With the continuing rise of ransomware, malware defenses are more critical than ever before with regard to securing the enterprise. Anti-Malware technologies have become an afterthought in many organizations, a technology that they’ve always had, always used, and never really thought about. This control serves as a reminder that this technology is as critical as it ever was and lays out the minimum requirements for ensuring your malware defenses are up to the task.

Admin update: Create auto-lock, release channel, and 1Password browser extension rules

Every organization has its own team culture, processes, and security requirements. That’s why we’re continuously updating 1Password Enterprise Password Manager with new options that give you greater flexibility and granular control.

Why Protecting Third-Party APIs is Essential for Enterprise Security

In today’s rapidly interconnected digital environment, third-party APIs have become fundamental for enhancing functionality and enriching user experiences. However, as seen in recent incidents like the Kaiser data breach, these third-party integrations carry risks that, if unaddressed, can lead to significant security and privacy violations.

Tech Support Scams Exploit Google Ads to Target Users

It's not a new technique, but that doesn't mean that cybercriminals cannot make rich rewards from SEO poisoning. SEO poisoning is the dark art of manipulating search engines to ensure that malware-laced adverts and dangerous websites appear high on users' results - often impersonating legitimate businesses and organisations. But the simplest way of all to get a malicious website in front of a potential victim is to create a Google advertising account, and buy your way to the top of the search results.

Protecting Against Bot-Enabled API Abuse

APIs have become the backbone of modern digital ecosystems, powering everything from mobile apps to e-commerce platforms. However, as APIs grow in importance, they also become prime targets for malicious actors. Increasingly, bots are being weaponized to exploit vulnerabilities, overwhelm systems, and siphon sensitive data—all without triggering alarms until it’s too late.

Lessons to Learn from TeamTNT: Best Practices for Securing Cloud Environments

Is your system being used for crypto mining without your consent? This might sound unlikely to you, but it could be possible, and you won’t even know about it. Cryptojackers can find your unprotected or exposed servers to put malicious code or malware and use it for mining cryptocurrencies.

Disaster Recovery Planning: Getting Started

As organizations face the imminent threat of an IT service outage or cyberattack, they often fail to step back and understand how well they've planned to deal with the crisis. According to recent research, we know that: Perhaps the most regrettable part of it all? Almost half (45%) of these organizations already acknowledge the inadequacy of their disaster recovery capabilities.

The Role of AI in Cybersecurity: Opportunities, Challenges, and Future Threats

As 2024 comes to a close, we went around the room and asked some of Trustwave’s top executives what cybersecurity issues and technology they saw playing a prominent role in 2025. Over the next several weeks their thoughts will be posted here, so please read on and stay tuned! As artificial intelligence (AI) continues to advance, its applications in cybersecurity will become more prominent and will spark conversations around its potential and its risks.

Securing the Future of Automotive Cybersecurity: The Past, Present, and Future of IoT/OT Security

The landscape of connected vehicles is evolving at a breakneck pace. From software-defined vehicles (SDVs) to autonomous driving, the automotive industry has become a nexus for innovation and vulnerability. As Ran Ish-Shalom, Chief Product Officer at Argus Cyber Security, aptly stated during a recent session: Brian Carpenter from CyberArk reinforced this, emphasising the growing complexity of managing identities across both human and machine ecosystems.