Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Engine Room: Powering Your Human Risk Management Strategy with Intelligent Tech

We’ve come a long way. We’ve deconstructed the problem, explored the complexity of humans, and laid out a strategic framework and a practical map—all of which can be explored in more detail in our Human Risk Management (HRM) whitepaper. Now for the final piece of the puzzle: the engine. A strategy this dynamic and personalised can't run on spreadsheets and manual effort alone. It needs to be powered by an intelligent, integrated platform.

Warning: Job Scams Surge by More than 1000%

Job-related scams surged by more than one thousand percent between May and July 2025, according to new research from McAfee. Job seekers are particularly vulnerable to scams, since they’re expecting to receive unsolicited messages and are more likely to overlook red flags. The researchers offer the following advice to help users avoid falling for these attacks: The researchers conclude that awareness is an essential layer of defense against social engineering attacks.

A Surge in Text Message Scams Targets Younger Americans

A new report warns of a significant spike in SMS phishing (smishing) scams targeting younger Americans between 18 and 29 years old. The report, released by Consumer Reports, Aspen Digital and the Global Cyber Alliance, also found that 30 percent of people who experienced a cyberattack or scam this year said it began over a text message or a messaging app, compared to 20 percent last year.

Why you keep getting job scam texts

Job scam texts are blowing up phones everywhere, and they’re only getting sneakier. Stay one step ahead by keeping the fakes out, and help keep your information safe with Avast Mobile Security. You’re in line for coffee when your phone buzzes: “Hi! We reviewed your profile for a remote job. $1,200/week, no experience needed! Text YES to learn more.” Looks tempting at first glance, right? But if your scam radar isn't going off yet, it should be.

CVE-2025-61884: Oracle Releases Emergency Patch for Information Disclosure Flaw

On October 11, 2025, Oracle released an emergency fix for a high-severity information disclosure vulnerability in Oracle E-Business Suite (EBS), tracked as CVE-2025-61884. The flaw exists in the Runtime UI component of Oracle Configurator and allows remote unauthenticated threat actors to access sensitive resources. Oracle has not confirmed a link between this vulnerability and the extortion emails received by some Oracle EBS customers from the Cl0p ransomware group in recent weeks.

How we built the Questionnaire Automation Browser Extension

Many of our customers ran into an issue where they’d receive questionnaires via third-party vendor portals and would need to import them into the Vanta app. Since these portals lacked spreadsheet export, their only option was to manually copy and paste questions into a spreadsheet before uploading it to Vanta.

Cybersecurity Awareness Month: What You Can do to Go the Extra Mile

Like Halloween, October is also Cybersecurity Awareness Month, a time for organizations and individuals to sharpen their focus on data protection. With cybercrime rates soaring since 2020, this annual reminder has never been more critical. The conversation is shifting from viewing cybersecurity as just an IT problem to recognizing it as a shared business responsibility. According to the World Economic Forum, human error is a factor in a staggering 95% of all cybersecurity incidents.

CMMC 2.0 Certification: Your Survival Guide

Most defense contractors focus on winning contracts, delivering on time, and maintaining quality. However, the reality is that without CMMC certification, you won’t even qualify to bid. The Cybersecurity Maturity Model Certification exists for one primary reason: to protect the defense industrial base from >$600 billion annual cost of intellectual property theft (per Forbes) targeting defense information.

When Time-to-Exploit Goes Negative: Rethinking Defense for Irish Critical Infrastructure

When we analyzed Ireland's critical national infrastructure (CNI) through an intelligence lens, the findings were sobering. Of 222 CNI organizations examined, 98—nearly 44%—have exposed known vulnerabilities. We then analyzed whether these open doors were being actively exploited by threat actors. Ireland is home to 15,776 attack origins, and 85% of them are the very same IPs and networks in CNI organizations with those exposed known vulnerabilities.