Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

NIS2: Why Europe's New Cyber Directive is a Blueprint for True Cyber Resilience

A new cybersecurity reality has taken shape across Europe: the European Union’s updated Network and Information Security Directive (also known as NIS2) went into effect in January 2025. This sweeping regulation expands the cybersecurity obligations of thousands of organizations in critical sectors from energy and transport to healthcare, finance, cloud and data centers. Much like the Digital Operational Resilience Act (DORA) in the financial world, NIS2 isn’t just another compliance checkbox.

Countering Chinese State-Sponsored Espionage Campaigns: SafeBreach Coverage for CISA Advisory AA25-239A

In August 2025, a joint Cybersecurity Advisory (CSA) was issued by CISA, NSA, FBI, and allied cybersecurity agencies across the Five Eyes, EU, and partner nations. This advisory details a long-term espionage campaign by People’s Republic of China (PRC) state-sponsored actors—linked to companies supporting the Ministry of State Security (MSS) and People’s Liberation Army (PLA).

Beyond Legacy Pen Tests: What to Look for in a Modern Internal Security Validation Platform

If you’ve decided relying on annual penetration tests isn’t enough anymore (smart move), the next question is: “What’s the best way to continuously prove — and improve — our internal security posture?” There’s no shortage of platforms out there promising to be your automated red team, internal pentester, or attack-surface explorer. But dig deeper, and you’ll see not all of them are built the same.

Win-DoS Epidemic: A Crash Course in Abusing RPC for Win-DoS & Win-DDoS

A denial of service (DoS) attack is a malicious tactic used to disrupt the normal traffic of a server, service, or network. It occurs when an attacker attempts to flood a specific target server with an overwhelming amount of requests in an attempt to crash it or cause it to malfunction.

You Snooze You Lose: RPC-Racer Winning RPC Endpoints Against Services

The remote procedure call (RPC) protocol is one of the building blocks of Microsoft Windows and is widely used for inter-process communication between clients and servers. When RPC clients search for a server based only on a universally unique identifier (UUID) of an interface—without specifying an endpoint—they will go through the Endpoint Mapper (EPM). It will connect them to an endpoint that a server registered, exposing the interface the clients are looking for.

Why Legacy Penetration Testing Is Dead Between the Audits: How Lean Security Teams Can Finally Get Ahead

For decades, penetration testing has been the gold seal of cybersecurity. Auditors love them. Insurance brokers demand them. Your board sees them and believes the “secure” box for your company has been sufficiently checked. And to be clear: manual pen tests have an important place. For compliance mandates, regulatory filings, or mission-critical systems, there’s no substitute for a skilled third-party team that probes your environment.

Invitation Is All You Need: Invoking Gemini for Workspace Agents with a Simple Google Calendar Invite

Over the last two years, various systems and applications have been integrated with generative artificial intelligence (gen AI) capabilities, turning regular applications into gen-AI powered applications. In addition, retrieval augmented generation (RAG)-which is the process of connecting gen-AI and large language models (LLMs) to external knowledge sources-and other agents have been incorporated into such systems, making them more effective, accurate, and updated.