Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How to Turn on Guided Access on Android Devices?

Do you ever wish you could lock your Android device to a single app or restrict specific functions for a more focused and secure experience? Guided Access can make it happen. This blog will guide you through everything you need to know about enabling Guided Access for Android devices, its benefits, and how miniOrange MDM can take it to the next level.

AI-Powered Remediation: Mend SAST Performs +46% Better Than Competitors

Security teams face limited resources and a growing attack surface while developers struggle with security responsibilities that feel burdensome, annoying, or seem to conflict with their first priorities. AppSec teams turn to static application security testing (SAST) tools to identify vulnerabilities in first-party code early in the software development lifecycle while developers can still fix issues before the code is old and forgotten about.

[Eye Opener] Is DeepSeek The Next Threat in Social Engineering?

AI is advancing at lightning speed, but it’s also raising some big questions, especially when it comes to security. The latest AI making headlines is DeepSeek, a Chinese startup that’s shaking up the game with its cost-efficient, high-performing models. But it’s also raising red flags for cybersecurity pros. DeepSeek overnight became a top contender, mostly driven by curiosity.

Debugging Connectivity in Calico eBPF: The Mysterious bpfDataIfaceRegexp & co.

The eBPF dataplane differs from traditional Linux dataplane in many ways, with its structure largely dictated by the location of the so-called eBPF hooks inside the kernel – locations where developers can inject their eBPF programs to change default kernel behavior.

CrowdStrike Falcon Platform Achieves Perfect Score in SE Labs' Most Comprehensive Ransomware Evaluation

In the 2024 SE Labs Enterprise Advanced Security (EDR) Ransomware Test, the CrowdStrike Falcon platform achieved a perfect score of 100% in detection, protection, and accuracy, earning the prestigious AAA Award for Advanced Security EDR Protection for the third time in a row. The Falcon platform detected and blocked 100% of ransomware files and protected endpoints across multiple stages during all simulated ransomware attacks.

AI-Powered Attacks Surge: 1,025% Jump in Vulnerabilities, 99% are API related

Wallarm's 2025 API ThreatStats Report offers a sweeping look at how AI deployments drive a surge in security risks. In 2024, Wallarm researchers discovered 439 AI-related CVEs-up an astonishing 1,025% from the prior year. Nearly all these flaws, 99%, point back to insecure or mismanaged APIs.

How Apple is Battling Phishing Scams and Protecting Your Personal Data

The digital world is now facing a serious challenge of phishing where fraudsters employ fake emails, websites or links to get confidential data which can result into great losses if not well handled. Apple, however, has taken several steps to protect users from these attacks.

Common Mistakes Companies Make When Implementing GDPR Policies

The General Data Protection Regulation (GDPR) has set a high standard for data protection and privacy in the European Union, impacting businesses worldwide. While most companies recognize the importance of compliance, many make critical mistakes during implementation, leaving them vulnerable to fines and reputational damage. Here are some of the most common pitfalls and how to avoid them.

Importance of Speed in Threat Intelligence

The threat landscape is evolving at an unprecedented rate, with organisations facing increasingly complex and malicious cyber threats. As cyber-attacks grow in frequency and sophistication, Cyber Threat Intelligence (CTI) has emerged as a critical focus for many organisations striving to counter these rising challenges effectively.