Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Navigating AI Agent Security Amid Evolving Regulations

The landscape of artificial intelligence (AI) governance is undergoing significant changes, particularly as it relates to the rise of AI Agents—autonomous systems that can independently make decisions and execute tasks. Recently, a key executive order on AI safety was rescinded, which previously required developers to share safety test results with federal agencies and mandated comprehensive assessments of AI-related risks.

A Beginner's Guide to Service Accounts: What They Are and How To Secure Them

Service accounts are nonhuman privileged accounts used by systems or applications to perform certain tasks, access resources or run processes. These accounts are typically given only the permissions they need for a specific job. According to ReliaQuest, 85% of data breaches between January 2024 and July 2024 that organizations responded to involved compromised service accounts. To prevent the misuse of credentials, organizations should secure their service accounts.

NIS2 is Here - Understanding the NIS2 Directive and Its Transposition Across Europe

The Network and Information Security Directive (NIS2 Directive) is an important piece of European Union legislation aimed at bolstering cyber security across the member states. NIS2 officially came into force on 17th October, and while some EU member countries have met this deadline, many are still working to fully transpose the legislation.

Cyber Security Managed Services: Enhance Your Protection with Expert Solutions

Among the most important aspects of building a new digital economy are protecting sensitive digital "boxes" of data, which takes a special kind of work to do well. Cyber security managed services have emerged as a practical solution to this issue, equipped with comprehensive defense mechanisms with professionals' strategies and the latest technologies. Threats evolve, and businesses cannot rely on old security methods anymore.

Understanding the EU's Cyber Resilience Act (CRA)

The Cyber Resilience Act (CRA) introduces a much-needed framework for standardizing the cybersecurity practices of companies operating in the European Union (EU). The regulation sets clear expectations for hardware and software manufacturers, developers, and distributors, outlining how they should manage and address vulnerabilities at every stage of the product lifecycle.

Stratoshark: Extending Wireshark's legacy into the cloud

There is nothing more exciting (or nerve-wracking) than sharing something you’ve created with the world. Over 25 years ago, we started working on Wireshark. For us, it has always been more than just a piece of software — it’s how we met, how we began our careers, and how we learned to solve problems that once seemed insurmountable.

Malvertising Campaign Abuses Google Ads to Target Advertisers

Researchers at Malwarebytes are tracking a major malvertising campaign that’s abusing Google Ads to target individuals and businesses interested in advertising. The threat actors are using compromised Google Ads accounts to run ads that impersonate Google, leading victims to a fake Google login page designed to steal their credentials.