Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Warning: Ransomware Attacks Surged by 63% Last Quarter

Ransomware attacks increased by 63% year-over-year in the second quarter of 2025, with a total of 276 publicly disclosed incidents, according to a new report from BlackFog. Notably, there were far more ransomware attacks that weren’t publicly disclosed. The researchers note, “The figures also reveal that the scale of hidden activity remains significant, with 80.9% of all ransomware attacks going unreported.

Why AI Infrastructure Growth Demands Next-Gen Cybersecurity and PAM

Global Artificial Intelligence (AI) infrastructure spending is projected to surpass $200 billion by 2028, according to research from the International Data Corporation (IDC). As organizations rapidly deploy more complex AI systems, the demand for high-performance infrastructure, like Graphics Processing Units (GPUs) and AI accelerators, is surging. This growth exponentially increases computing power, energy consumption and data exchange across hybrid and cloud environments.

The Data Sovereignty Debate Heats Up

The debate over data sovereignty spurred by the U.S. CLOUD Act is intensifying. On June 10, 2025, France’s Senate held a hearing on the role of procurement in data sovereignty, where Anton Carniaux, Director of Public and Legal Affairs at Microsoft France, testified. He stated he could not guarantee that data from French citizens would not be shared with U.S. authorities without explicit authorization from French authorities.

Deploying Gen AI Guardrails for Compliance, Security and Trust

AI guardrails are structured safeguards, whether technical, security or ethical, which are designed to guide AI systems so they operate safely, responsibly, and within intended boundaries. Much like highway guardrails that prevent vehicles from veering off course, these measures ensure AI remains aligned with organizational policies, regulations, and ethical values.

Beyond the Patch: SharePoint Exploits and the Hidden Threat of IIS Module Persistence

The cybersecurity landscape witnessed a perfect storm in July 2025 when multiple critical SharePoint vulnerabilities collided with sophisticated IIS module-based persistence techniques, creating a nightmare scenario for enterprise defenders. CVE-2025-53770, CVE-2025-53771, CVE-2025-49704, and CVE-2025-49706 are being actively exploited by sophisticated threat actors, but the real danger extends far beyond the initial exploitation phase.

Big News for the CMMC Program: Companion DFARS Rule Reaches OMB Review

The Department of Defense’s (DOD) has at long last submitted its’ final rule to the Office of Information and Regulatory Affairs (OIRA) for final review, “Assessing Contractor Implementation of Cybersecurity Requirements (DFARS Case 2019-D041).” The submission is a game changer for the defense sector, as it marks a critical milestone for the Cybersecurity Maturity Model Certification (CMMC) program, indicating an estimated Q4 start to the rollout and enforceability.

What Happened to The FedRAMP JAB Process?

The government doesn’t often move quickly, but when it moves, the changes it makes tend to have long-term and far-reaching ripple effects throughout business and industry. That’s true whether it’s a policy decision, a financial decision, or a restructuring of an organization, and it will always be true at the scale the federal government operates. One recent change in the world of government cybersecurity is a change to how FedRAMP operates.

miniOrange SAML SSO for Azure AD: A Better Way to Secure Your Atlassian Environment

As teams expand and compliance tightens, disconnected logins and manual provisioning create more risk than resilience. Learn how miniOrange SAML SSO syncs Azure AD with Jira, Confluence, and Bitbucket to bring seamless access and centralized control to your Atlassian stack.