Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Context-Aware Tokenization: How Protecto Unlocked Safer, Smarter Healthcare Data Analysis

The healthcare industry, despite being highly regulated, is one of the most targeted for breaches, necessitating tight measures. While these measures are necessary, they often restrict the free flow of information, critical for analysing patient outcomes and improving internal operations. Tokenization has long been a reliable method for masking protected health information (PHI). But not all tokenization is created equal.

When It Comes to Breaches, Boards Can't Hide Behind CISOs Any Longer

A trend that has long been on the rise is finally having its day. A recent industry report revealed that 91% of security professionals believe that ultimate accountability for cybersecurity incidents lies with the board itself, not with CISOs or security managers. If the security discussion hadn’t fully made its way into C-suite conversations before, it has now.

What's In an Identity? The Executive Attack Surface and Rising Threat of VIP Impersonation

With time, effort, and a blessing from the LinkedIn networking Gods, a high-level executive's identity can be transformative for a company. More than just a name and title, these executives become symbols of authority and trust, someone employees, customers, and partners instinctively follow. Personas like Elon Musk and Tim Cook instill confidence and belief in their employees and consumers by championing their products and their ethos.

CrowdStrike Collaborates with AI Leaders to Secure AI Across the Enterprise

AI is transforming how organizations operate, from automating workflows to fueling innovation and competitive advantage. It’s the backbone of the modern enterprise. But while the opportunities AI presents are enormous, they come with new risks: models can be stolen, cloud workloads can be hijacked, and data can be poisoned. Every layer of the AI stack — from GPUs and training data to inference pipelines and SaaS apps — is a new target.

Announcing Threat AI: Security's First Agentic Threat Intelligence System

CrowdStrike is unveiling groundbreaking innovations across Counter Adversary Operations. Threat AI, a system of AI-powered agents built on the CrowdStrike Falcon platform, is the industry’s first agentic threat intelligence system. It provides mission-ready agents to reason, hunt, and take action against any stage of adversary activity. In addition, the new Threat Intelligence Browser Extension for Google Chrome extends intelligence everywhere analysts work.

Falcon for IT Redefines Vulnerability Management with Risk-based Patching

CrowdStrike is introducing Risk-based Patching in CrowdStrike Falcon for IT to close the gap between security and IT teams. With AI-powered Risk-based Patching and CrowdStrike Falcon Exposure Management, organizations can identify, prioritize, and fix the vulnerabilities most critical to them through a single console and workflow while accelerating security and IT consolidation.

RaccoonO365 Domain Takedown: Microsoft and Cloudflare Dismantle Global Phishing Network

The cybercrime world took a major hit this month with the RaccoonO365 domain takedown, a coordinated move by Microsoft’s Digital Crimes Unit (DCU) and Cloudflare. By seizing 338 malicious domains, investigators disrupted a sprawling phishing-as-a-service ( PhaaS) network that had stolen more than 5,000 Microsoft 365 credentials across 94 countries. This action signals a shift toward large-scale, proactive disruption of phishing operations that exploit everyday users and global enterprises alike.

Military ID Deepfakes: How North Korean Hackers Target the South with AI

North Korean threat actor Kimsuky has escalated its social engineering tactics by leveraging military ID deepfakes to deceive South Korean targets. According to a recent analysis by South Korean cybersecurity firm Genians, the group is now using AI-generated images to impersonate military personnel, making phishing campaigns more convincing and harder to detect.

Microsoft 365 Backup Best Practices

Did you know that the average cost of an outage can be as high as $9K per minute? Risks concerning your Office 365 data range from accidental deletions and ransomware to service outages. In 2025, we already witnessed a number of outages happening throughout the year. On March 1, several key services such as Outlook, Teams, and even Azure were disrupted. It is reported that 30K Outlook users, 150 Microsoft Teams users, and 24K Office 365 users were affected by this.

What is a HIPAA Violation? Fines and Penalties for Failed HIPAA Compliance

Complying with HIPAA is tricky, as it consists of multiple rules and requirements. However, following them is a must if you want to secure your data and avoid penalties. In this article, we discuss common types of HIPAA violations and the penalties you could face for breaking this law. Find out below how to ensure HIPAA compliance for your healthcare organization and the security of patient information you collect.