Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

0Click Attacks: When TTPs Resurface Across Platforms

If there’s one lesson security teams should take from recent disclosures, it’s this: AI agent attack techniques don’t disappear - they resurface, across vendors and platforms, with only small variations. What researchers called out months ago is showing up again, now in Salesforce as the ForcedLeak vulnerability.

Resilience by Design: How to Stay Online During Attacks and Outages

In today’s cloud-native world, resilience isn’t optional — it’s foundational. Daniele Molteni, Director, Product Management for Application Security at Cloudflare, is leading a panel at Cloudflare Connect 2025 that tackles a core question: how do you design systems to withstand attacks, outages, and failures? In this preview, Daniele shares what’s at stake when downtime hits — and how leaders are rethinking operational continuity for the modern Internet.

The Weak Link: Recent Supply Chain Attacks Examined

Originally published: April 2023 Updated: September 2025 Supply chain attacks are a growing and increasingly sophisticated form of cyber threat. They target the complex network of relationships between organizations and their suppliers, vendors, and third-party service providers. These attacks exploit vulnerabilities that emerge due to the interconnected nature of digital supply chains, which often span multiple organizations, systems, and geographies.

Improving Cyber and Mental Resilience with Threat Information Sharing

In a world where data provides companies with a competitive advantage, sharing it amongst other businesses, especially in the same industry, may seem counterproductive. However, in cybersecurity, where every company is a potential target for threat actors and organizations are increasingly interconnected through supply chains, sharing information can significantly enhance a company's security posture and overall resilience.

A Single Cyberattack Stopped Jaguar Land Rover-and Could Stop You Next

The $2 Billion Cyber Disaster That Shook the Automotive World On September 2, 2025, Jaguar Land Rover (JLR) suffered a automotive cyberattack that instantly froze production lines, shutdown the dealerships and paralyzed the luxury automaker’s global IT systems during the UK’s “New Plate Day”—one of the busiest times for the industry.

Smash and Grab: Aggressive Akira Campaign Targets SonicWall VPNs, Deploys Ransomware in an Hour or Less

In late July 2025, Arctic Wolf Labs began observing a surge of intrusions involving suspicious SonicWall SSL VPN activity. Malicious logins were followed within minutes by port scanning, Impacket SMB activity, and rapid deployment of Akira ransomware. Victims spanned across multiple sectors and organization sizes, suggesting opportunistic mass exploitation. This campaign has recently escalated, with new infrastructure linked to it observed as late as September 20, 2025.

Carding ecosystem: The fall of traditional financial cybercrime

Carding is a type of cybercrime where attackers steal or illegally buy credit card information and use it to make unauthorized transactions. It often involves testing stolen card numbers with small purchases before making larger fraudulent charges. Criminals typically exchange or sell these stolen details on underground forums or dark web marketplaces. Outpost24’s Threat Intelligence team, KrakenLabs, carried out a previous public analysis of the underground card fraud ecosystem in 2022.

How Legal Firms Can Protect Against Cyberthreats and Confidentiality Leaks Online

Law firms face an unprecedented cybersecurity crisis, with hackers targeting legal practices due to the increase of sensitive client data they possess. Understanding these evolving threats and implementing solid protective measures has become essential for maintaining client trust and regulatory compliance.