Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Brute Force Attack Prevention: Why Rate Limiting Isn't Enough for ATO Defense

A brute force attack is a method cybercriminals use to guess login credentials through repeated attempts until one works. It’s a simple idea that’s evolved into one of the most persistent enablers of account takeover (ATO). According to the 2024 Verizon Data Breach Investigations Report, brute force and credential-stuffing techniques accounted for nearly 70% of all password-related breaches that year, underscoring how these attacks remain a dominant entry point for ATO.

AI Sidebar Spoofing Attack: SquareX Uncovers Malicious Extensions that Impersonate AI Browser Sidebars

SquareX released critical research exposing a new class of attack targeting AI browsers. The AI Sidebar Spoofing attack leverages malicious browser extensions to impersonate trusted AI sidebar interfaces, which is used to trick users into executing dangerous commands that can lead to credential theft, device hijacking, and password exfiltration.

Minimizing liability is not the same as security: Lessons from Recent Airport Cyber Disruptions

Blog post updated for clarity. In late September 2025, several European airports reported significant delays and flight cancellations due to disruptions with their check-in and passenger systems. As a global leader in aviation technology and the backbone of passenger travel, protection of systems and customer operations is paramount for Collins Aerospace. Nonetheless, the vendor of the vMUSE check-in system had been hit by a ransomware attack.

What Is Whaling in Cyber Security? How Attackers Target the C-Suite

Cybercrime doesn’t differentiate between individuals. It can happen to anyone, anytime. We have all heard about phishing attacks, where attackers deceive innocent people into clicking on malicious links and expose their sensitive information. It happens through text messages, emails, and phone calls. When such phishing targets high-profile individuals, like CEOs, CFOs, or top executives of organizations, it’s called a ‘Whaling Attack’.

Minimizing liability is not the same as security: Lessons learned from Collin's Aerospace cyberattack

In late September 2025, several European airports reported significant delays and flight cancellations due to issues with their check-in and passenger systems. Collin’s Aerospace, the vendor of the vMUSE check-in system, had been hit by a ransomware attack. ARINC error message: Source: Cyberplace.social.

CVE-2025-6515 Prompt Hijacking Attack - How Session Hijacking Affects MCP Ecosystems

JFrog Security Research recently discovered and disclosed multiple CVEs in oatpp-mcp – the Oat++ framework’s implementation of Anthropic’s Model Context Protocol (MCP) standard. Among these, CVE-2025-6515 stood out due to its potential threat of hijacking MCP session IDs. Within the context of MCP we’ve dubbed this new attack technique “Prompt Hijacking“. Your browser does not support the video tag.

Ransomware Reality: Business Confidence Is High, Preparedness Is Low

Every organization faces ransomware, but not every organization is prepared to handle it. The CrowdStrike State of Ransomware Survey explores the substantial gap between confidence in global businesses’ ransomware readiness and their actual preparedness — a gap poised to grow as adversaries use AI to launch faster, stealthier attacks.

Phishing Remains the Top Initial Access Vector in Cyberattacks Across Europe

Phishing was the initial access vector for 60% of cyberattacks across Europe between July 2024 and June 2025, according to the European Union Agency for Cybersecurity (ENISA). “With regards to the primary method for initial intrusion, phishing (including vishing, malspam and malvertising) is identified as the leading vector, accounting for about 60% of observed cases,” the agency says.