Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Console Chaos: A Campaign Targeting Publicly Exposed Management Interfaces on Fortinet FortiGate Firewalls

In early December, Arctic Wolf Labs began observing a campaign involving suspicious activity on Fortinet FortiGate firewall devices. By gaining access to management interfaces on affected firewalls, threat actors were able to alter firewall configurations. In compromised environments, threat actors were observed extracting credentials using DCSync.

7 Key Factors to Consider When Choosing a Modern PAM Solution in 2025

In 2025, global cybersecurity trends like the rise of Zero Trust, tightening data privacy and AI regulations and growing concerns over cloud security will only accelerate. Each of these evolving forces will also shift paradigms for the privileged access management (PAM) programs charged with safeguarding IT, cloud ops and third-party vendor users as they perform high-risk operations.

2025: The Year of Evolution in Identity Security by David Morimanno, Director of Identity and Access Management Technologies

The year 2025 will not be a revolutionary one, it will be evolutionary, with developments coming into effect that were necessitated by events and happenings in 2024, and solutions to address these events reaching maturity levels that allow an appropriate, comprehensive response. With threats like ransomware certain to continue, identity resilience is going to become more important in the year ahead and, as such, identity will become the critical component of security.

Top 3 Mistakes PCI DSS SAQ-D Service Providers Are Making in 2025 That Will Knock Them Out of PCI DSS 4 Compliance

PCI DSS Compliance for SAQ-D Service Providers and Merchants is more critical than ever. Despite widespread awareness of the updated requirements, ot appears that over 90% of service providers remain unaware that they must implement new technical measures for the iFrames (with payment functions loaded) on their customers’ payment pages to meet Requirements 6.4.3 and 11.6.1.

Aligning to Secure the AI-Driven Enterprise

Next week marks a pivotal moment for Zenity as we gather for our Sales Kickoff (SKO). While SKOs are traditionally about aligning teams on goals and strategies, ours represents much more than that. It’s a celebration of the massive growth in the AI Agent space, the opportunities it creates, and our recommitment to supporting customers as they navigate this transformative and increasingly security-conscious era.

Securing Your Financial Ecosystem: A Guide to Managed Services for Supply Chain Detection and Response

A single breach can have devastating consequences in the highly regulated financial services industry. From reputational damage and customer loss to severe financial penalties, safeguarding your entire ecosystem is paramount. This blog explores the critical role of Managed Services for Supply Chain Detection and Response (SCDR) in securing your financial services organization.

Phishing, Impersonation and Cybersecurity Trends 2025

As scam-prone enterprises know, innovations in digital technologies raise the specter of phishing-related brand impersonation scams as much as they help mitigate it. Take rogue Generative AI tools like Fraud GPT and ‘Phishing-as-a-Service’ as just two examples of how fraudsters are co-opting new technologies as part of customer account takeover (ATO) schemes.

Mastering OpenShift Virtualization Backup - Recover VMs in 3 Minutes

In my previous blog post, (OpenShift Virtualization Backup and Restore with Trilio in AWS ROSA Baremetal ) I discussed how to protect VMs running in OpenShift Virtualization, specifically in AWS ROSA Baremetal environments. In this post, I want to focus on how you can recover a VM in less than 3 minutes. When it comes to recovery in Kubernetes environments, many of us feel relatively at ease, especially if the Persistent Volumes (PVs) are not particularly large.

Year in Review Report Overview

Seemplicity’s 2024 Year in Review report offers key insights into how organizations are navigating the challenges of vulnerability and exposure management. By analyzing data from over a billion customer findings across a wide range of industries, the report highlights the urgency of prioritizing vulnerabilities, streamlining workflows, and improving collaboration across teams.

Migrating to Cloud? A Complete Cloud Network Security Checklist

Migrating to the cloud is no longer just an option for businesses—it’s a strategic necessity in today’s digital landscape. The cloud offers unparalleled scalability, flexibility, and cost-efficiency, but it also presents a unique set of cloud network security challenges. A misstep in securing your network during migration can expose sensitive data, disrupt operations, and impact compliance.