Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Digital supply chain security: How to secure your supply chain with DLP and Secude

Data loss prevention (DLP) software provides strong protection after data is stored, Secude provides Zero Trust protection before data is stored. Together, they secure your digital supply chain. Ensuring digital supply chain security is a fundamental part of the EU’s NIS2 Directive - and for good reason. In recent years, digital supply chains have become the main targets of cyberwarfare, with supply chain attacks rising 2,600% since 2018.

Cato CTRL Threat Research: Exploiting Model Context Protocol (MCP) - Demonstrating Risks and Mitigating GenAI Threats

Generative AI (GenAI) is advancing rapidly, offering significant potential for business transformation. However, it also introduces new security risks. The Model Context Protocol (MCP), an open standard introduced by Anthropic in November 2024, enables seamless integration between GenAI applications and external data sources and tools. MCP is commonly referred to as a USB-C port for GenAI applications.

Generative AI Usage Gone Rogue? Cato Networks Mitigates Shadow AI Risk with Cato CASB

Today during SASEfy 2025, Cato Networks announced its latest AI innovation. Cato CASB (Cloud Access Security Broker), a native feature in the Cato SASE Cloud Platform, is now enhanced with new capabilities for generative (GenAI) applications including a shadow AI dashboard and policy engine. With the shadow AI dashboard, enterprises can detect, analyze, and gain insights into the use of GenAI. With the policy engine, enterprises can take control of user activities in GenAI applications.

UK Organizations Cite Phishing as the Most Disruptive Type of Cyberattack

Phishing was the most prevalent and disruptive type of attack experienced by UK organizations over the past twelve months, according to the British government’s Cyber Security Breaches Survey 2025. 85% of businesses and 86% of charities in the UK reported sustaining phishing attacks last year. “The qualitative interviews highlighted that phishing attacks were often cited as time-consuming to address due to their volume and the need for investigation and staff training,” the report says.

Key Takeaways from the Latest ISR: More Malware, and Harder to Detect

Malware hasn’t just increased—it’s become harder to detect. Evasive techniques are reshaping the threat landscape and pushing traditional security models to their limits. Today’s advanced malware campaigns are consistently slipping past multiple layers of defense—from email and network to endpoints—challenging even the most robust infrastructures.

Prophylactic Cybersecurity for Healthcare

In healthcare, preventative medicine is always more effective, less costly, and has better outcomes than waiting until after a serious heart incident occurs. It’s an apt analogy for cybersecurity as well. Prophylactic (preventative) care in cybersecurity yields far better outcomes than constantly scrambling to respond to critical incidents. Yet, many healthcare organizations find themselves buried by an avalanche of newly discovered vulnerabilities and regulatory pressures.

Snyk Partners with Nova8 to Empower Secure Development Across Latin America

The Latin American technology landscape is growing rapidly, with organizations embracing digital transformation and cloud-native development. This growth brings incredible opportunities to this market – but can also introduce significant security challenges that can slow innovation if not addressed proactively.

How Corelight's anomaly detection enhances network security

Signature-based detections provide fast, effective defense against known attacks. But the threat landscape is rapidly changing: Attackers are utilizing novel, sophisticated techniques that can bypass traditional, signature-based detection methods and also weaponizing legitimate tools and processes to avoid established detection tools, including endpoint detection. In this dynamic environment, organizations must in turn deploy new detection techniques to keep pace.

Can End-to-End Encryption Be Hacked?

We have become so reliant on communicating on the Internet that sometimes we need to take a minute to consider how our data is being protected and whether what we send on the Internet is truly safe. While end-to-end encryption has become integral to protecting our data online, you may be thinking, can end-to-end encryption be hacked?