Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Cybersecurity Leadership in Action: Fireblocks Reaches High NIST CSF Maturity Score

As someone who has spent decades working at the intersection of cybersecurity, innovation, and operational resilience, I’ve seen firsthand how critical it is to build trust in a rapidly evolving digital landscape. At Fireblocks, that trust is not just a goal—it’s a standard we continuously push ourselves to meet and exceed.

From Madison Avenue to Malware

In the bustling world of 1960s Madison Avenue, a young advertising executive named Lester Wunderman was about to revolutionize the industry. Wunderman, often called the father of direct marketing, had a simple yet profound insight: personalization was the key to capturing attention and driving action. Wunderman's breakthrough came when he created the Columbia Record Club, a mail-order service that tailored its offerings based on each member's past purchases and preferences. The results were staggering.

Don't Fall Victim: DeepSeek-Themed Scams Are on the Rise

Scammers are taking advantage of the newfound popularity of the China-based AI app DeepSeek, according to researchers at ESET. DeepSeek released its generative AI tool last month, and it’s since overtaken ChatGPT as the top free app in Apple’s App Store. Users are now spotting lookalike domains designed to deliver malware or steal information. Other scams offer users the opportunity to buy phony stocks in DeepSeek.

A Rose by Any Other Name: Exposure Management, a Category that Evolved from Vulnerability Management

As organizations increase their reliance on cloud services, remote work tools, IoT devices and smart infrastructures, and the use of third-party vendors, their exposure to cyber threats increases. Traditional approaches to vulnerability management are unable to keep up with rapidly changing business needs and an expanding attack surface. While scanning and patching known vulnerabilities remains critical, today’s complex threat landscape demands a more comprehensive strategy.

Comprehensive List of All Types of Internet Threats

An Internet threat is a threat that makes use of the World Wide Web to disperse, conceal, and update itself to facilitate cybercrime. By simply using the internet, we are constantly being bombarded by multiple types of internet threats. All types of internet threats apply various forms of malware and fraud, in which every part of it uses HTTP or HTTPS protocols, and utilizes other protocols and components, such as links in email or instant messaging, or malware attachments that have access to the Web.

Autonomous Adversaries: Are Blue Teams Ready for Cyberattacks To Go Agentic?

2024 was a year of incredible progression for Artificial Intelligence. As large language models (LLMs) have evolved, they have become invaluable tools for enriching the capabilities of defenders – instantly providing the knowledge, procedures, opinions, visualizations, or code any given situation demands. However, these same models provide outputs that enable even low-sophistication attackers to uplift their own skill-levels.

AI Security is API Security: What CISOs and CIOs Need to Know

Just when CIOs and CISOs thought they were getting a grip on API security, AI came along and shook things up. In the past few years, a huge number of organizations have adopted AI, realizing innumerable productivity, operational, and efficiency benefits. However, they’re also having to deal with unprecedented API security challenges. Wallarm’s Annual 2025 API ThreatStats Report reveals a staggering 1,025% year-on-year increase in AI-related API vulnerabilities.

What is a Tailgating Attack? Understand This Sneaky Security Threat

Imagine yourself entering your office building and, as you open the door, someone appears right behind you, behaving as if they belong there. Without a doubt, you let them in because you believe they are an employee. What if, however, that individual is a malevolent intruder? This is the fundamental idea behind a tailgating attack, a social engineering technique in which an unauthorized person uses human decency and trust to enter a restricted location.

Why 24/7 Security Monitoring Matters for Your Company

Cyber threats don’t take evenings or weekends off, and neither should your security team. Companies need peace of mind knowing that dedicated professionals are continuously monitoring their infrastructure and data, ensuring both proactive prevention and rapid response to potential incidents.

Network Security as a Service: Hassle-Free Cyber Protection

Cyber threats are increasing at a startling rate in today's digital environment, and by 2025, it is predicted that the yearly cost of cybercrime will have reached $10.5 trillion worldwide. From malware assaults to data breaches, businesses of all sizes must have strong network protection since security threats are always changing. But handling cybersecurity internally may be difficult, expensive, and time-consuming.