Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

You're Not My Supervisor! Researching My Own New Starter Scam

Earlier this year I joined the team at CultureAI, and like many, I shared the news on LinkedIn. Within weeks, I found myself at the receiving end of multiple phishing emails impersonating our CEO designed to exploit new employees. But rather than ignoring them, I thought it could be fun to play along, see where the rabbit hole led, and deep dive into the world of BCE and Gift Card scams.

The OWASP Top 10 Explained: Today's Top Risks in Web Apps and LLMs

Over the past few years, cyberattacks have escalated to unprecedented heights. Just last year, in 2024, 94% of organizations reported being the victims of phishing attacks. And in the first five weeks of 2025, ransomware attacks increased by 149% in the first 5 weeks of 2025. Organizations and users need help understanding and navigating these changing risks to fight against the rising tide of cybercrimes. Thankfully, that is exactly what The OWASP Foundation aims to do.

Unlocking IT Efficiency with AutomateNOW

In an increasingly digital world, businesses are constantly seeking tools to streamline their operations. AutomateNOW (ANOW) provides a robust solution by automating complex IT workflows and streamlining everyday tasks. This platform plays a crucial role in modern IT infrastructure, enabling organizations to manage processes more effectively, cut down on manual errors, and increase operational efficiency.
Sponsored Post

Boosting freelancer productivity by mastering how to keep track of hours worked

Freelancing is a unique blend of autonomy and accountability, where time becomes the invisible thread weaving together creativity, deadlines, and income. For independent professionals-whether they're writers crafting compelling copy, designers shaping visual identities, or developers coding innovative solutions-understanding how time flows through their day can unlock a world of efficiency and balance. Figuring out how to keep track of hours worked offers a practical way to gain that understanding without stifling the freedom that defines freelancing.

2025 Trustwave Risk Radar Report: Healthcare Sector: Key Risks and Defensive Measures

The healthcare industry, with its vast repository of electronic health records, a growing network of connected devices, reliance on legacy systems, and expanding telehealth solutions, continues to be a prime target for cyber threats. To provide deeper insights into these evolving risks, Trustwave SpiderLabs has expanded its healthcare cybersecurity research with the newly released 2025 Trustwave Risk Radar Report: Healthcare Sector - A New Era of Cybersecurity Challenges.

Exploring AI for Vulnerability Investigation and Prioritisation

The sheer volume of cybersecurity vulnerabilities is overwhelming. In 2024, there were 39,998 CVEs — an average of 109.28 per day! This constant stream of new threats makes it increasingly difficult for security teams to keep up. Large Language Models (LLMs) offer a possible solution, helping automate vulnerability investigation and prioritisation, allowing teams to more efficiently assess and respond to emerging risks. Do you even have time to skim over 109 CVEs a day?

The Imperative of Cyber Resilience: Shaping a Secure Future for Public and Private Sectors

When it comes to cyber attacks, it’s no longer a question of if but when. Threat actors aren’t discriminating between the public or private sector — each organization has valuable data, which means every organization is a viable target. In this new threat landscape, digital resilience — the ability to defend against, withstand, and recover from attacks — has become an operational imperative.

2025 Healthcare Cybersecurity Threats: Insights from the Trustwave Risk Radar Report

The healthcare industry, with its highly prized electronic health records, a myriad of connected devices, continued use of legacy systems, and expanding telehealth services, is a premier target for threat actors. To properly dissect the issues facing the healthcare industry, Trustwave SpiderLabs has updated its earlier healthcare cybersecurity coverage with the just-released 2025 Trustwave Risk Radar Report: Healthcare Sector - A New Era of Cybersecurity Challenges.

What Should a Company Do After a Data Breach? The First 5 Steps to Take

Cyberattacks and data breaches can’t be completely stopped in a day. As technology grows, attackers find different ways to intrude, constantly adapting to new security measures. Gartner forecasts that by 2027, generative AI will play a role in 17% of all cyberattacks, highlighting the growing threat of AI-driven tactics in the evolving landscape of cybersecurity. So, companies should always get ready to cope with any kind of sophisticated attacks at any time.

The Role of Sandbox Analysis in advanced Malware Detection

Malware continues to evolve with greater sophistication. Sandbox malware analysis offers a secure testing ground to detect and study potential threats before they impact production systems. According to MarketWatch, the network sandbox market’s growth reflects this technology’s rising importance, with projections reaching $5.1B by 2025. Advanced malware presents new challenges because it can now detect sandbox environments during analysis.