Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Fortinet Firewall Authentication Bypass Vulnerability (CVE-2024-55591)

As per a recent update from Fortinet, Exploitation of CVE-2024-55591, a recently disclosed authentication bypass vulnerability in FortiOS and FortiProxy, allows remote attackers to achieve super-admin privileges. By sending specially crafted requests to the Node.js WebSocket module, attackers can exploit this zero-day vulnerability to gain unauthorized access.

Cloudflare meets new Global Cross-Border Privacy (CBPR) standards

Cloudflare proudly leads the way with our approach to data privacy and the protection of personal information, and we’ve been an ardent supporter of the need for the free flow of data across jurisdictional borders. So today, on Data Privacy Day (also known internationally as Data Protection Day), we’re happy to announce that we’re adding our fourth and fifth privacy validations, and this time, they are global firsts!

DataTrails Passes SOC 2 Assessment - A Milestone in Media Authenticity and Digital Trust

DataTrails is excited to announce that it has achieved SOC 2 compliance, demonstrating our commitment to the highest standards of data security and privacy. This achievement underscores our dedication to providing robust solutions for media authenticity and digital trust, ensuring that our customers can rely on us to protect their data and uphold the integrity of their digital assets.

Cato CTRL Threat Research: Unmasking Hellcat - Not Your Average Ransomware Gang

There’s a new ransomware gang targeting critical infrastructure, government organizations, educational institutions, and energy sectors. Their name? Hellcat. But who exactly are they? Hellcat is a new ransomware gang that has surfaced across dark web forums in 2024. Hellcat employs a ransomware-as-a-service (RaaS) model, offering ransomware tools and infrastructure to affiliates in exchange for a share of the profits.

AI-Powered Attacks Surge: 1,025% Jump in Vulnerabilities, 99% are API related

Wallarm's 2025 API ThreatStats Report offers a sweeping look at how AI deployments drive a surge in security risks. In 2024, Wallarm researchers discovered 439 AI-related CVEs-up an astonishing 1,025% from the prior year. Nearly all these flaws, 99%, point back to insecure or mismanaged APIs.

How Apple is Battling Phishing Scams and Protecting Your Personal Data

The digital world is now facing a serious challenge of phishing where fraudsters employ fake emails, websites or links to get confidential data which can result into great losses if not well handled. Apple, however, has taken several steps to protect users from these attacks.

Common Mistakes Companies Make When Implementing GDPR Policies

The General Data Protection Regulation (GDPR) has set a high standard for data protection and privacy in the European Union, impacting businesses worldwide. While most companies recognize the importance of compliance, many make critical mistakes during implementation, leaving them vulnerable to fines and reputational damage. Here are some of the most common pitfalls and how to avoid them.

Nearly Three-Quarters of UK Education Orgs Have Sustained Cyberattacks

73% of educational institutions in the UK have sustained at least one cyberattack or breach in the past five years, according to researchers at ESET. Additionally, a fifth of these organizations said they’ve experienced three or more cyberattacks. 43% of the organizations surveyed cited phishing attacks as their top concern.

The New Cato Trust Center: An Essential Step for Today's Interconnected Enterprise

Transparency in security practices is essential for building trust in today’s interconnected digital world. Organizations that openly share certifications, audit reports, and policies demonstrate a commitment to safeguarding data and adhering to standards. This openness fosters stronger partnerships and sets a benchmark for accountability.