Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Lessons from the Dark Web: What Hackers Teach Us about Cyber Resilience

With a background in philosophy, my transition into the world of cybersecurity as a penetration tester sparked a deep curiosity about the inner workings of the prolific cybercrime groups I saw in the news. To better defend against these groups, I needed to understand more about how they worked, specifically how they recruited people, vetted them, and turned their skills into a profitable business model.

Decipher Me. What Hack Can You Detect?

What do people love more than secrets? Deciphering them. Join Etay Maor, founding member of Cato CTRL and chief security strategist at Cato, as he exposes the hidden mechanics behind AI prompt injections. From the secret codes of espionage to the subtle tricks of modern cybercriminals, this session connects the dots between history’s ciphers and today’s AI vulnerabilities. Because every secret has a pattern—if you know where to look.

Billions Lost in Hacks: Why Crypto Security Matters More Than Ever in 2025

Despite a rocky start, the cryptocurrency sector has entered the mainstream financial industry as an integral part. As the pace of institutional adoption quickens, more and more governments, corporations, and banks across the globe are adding crypto to both their portfolios and daily operations. However, increased adoption also means increased security exposure. Various safety risks that threaten the crypto sector are becoming a massive threat to users and developers alike. In Q1 2025, hacks totaled around $1.63 billion, marking a staggering 131% increase from Q1 2024.

NPM Account Compromise - Tracking the "Shai-Hulud" Worm

Amid growing reports from the security community, Veracode has been closely tracking the resurgence of a sophisticated threat actor behind the recent npm account compromise and the injection of malware into the widely-used ‘nx’ package. This evolved malware now exhibits worm-like capabilities, enabling it to spread rapidly and amplify its infectious impact across the ecosystem.

How Hackers Exploit Seasonal Email Subject Lines

Every year, as the holiday season approaches, inboxes flood with promotional offers, shipping updates, and festive greetings. For most people, this is simply a sign of the times-retailers ramping up campaigns to capture the seasonal shopping frenzy. But for cybercriminals, the holidays present an ideal opportunity. By exploiting trust in familiar brands and playing into the excitement of seasonal sales, hackers craft fraudulent subject lines designed to trick recipients into clicking.

Biggest Data Breaches In History, And What We Have Learned From Them

Basically, hackers do not hack. They infiltrate systems. They explore vulnerabilities. They examine data flows, searching for weaknesses to exploit. And then they log in. Almost, we could romanticize them. A hopeless romantic who is reading Dostoievski for lunch would surely do that. But regardless, that is light-years away from the objective of our article. To begin, we would like to highlight the alarming prevalence of data breaches, which persist despite the relentless advancements in technology, advancements that one might assume would mitigate such threats. In 2024 alone, over 5.5 billion records were compromised globally.