Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why Mid-Market Organizations Can't Afford to Ignore Open Source Vulnerabilities

There are millions of dollars on the line for companies relying on open source. Failure to stay CVE-free can lead to churn, closed-lost deals, and countless engineering hours wasted chasing fixes instead of shipping features. Unlike enterprises with large budgets and compliance buffers, a single failed review, missed SLA, or unresolved CVE can derail $5M–$20M in just one quarter. This is the difference between hitting growth targets or missing them entirely.

What is KeeperAI?

KeeperAITM is an agentic, AI-powered engine embedded within KeeperPAM that delivers real-time threat detection and response, as well as privileged session analysis. Built for Privileged Access Management (PAM), KeeperAI monitors user activity, providing behavioral insights and automated incident response in both live SSH sessions and post-session playback.

10 Things to Look for When Choosing an Account Takeover Solution

Account takeover (ATO) fraud has become one of the fastest-growing threats for enterprises. No longer confined to banks, ATO now targets retailers, SaaS platforms, airlines, and any business that maintains digital accounts for customers. The problem? Most enterprises are still relying on outdated defenses like domain takedowns, MFA, and dark web monitoring. By the time these tools kick in, fraudsters have already stolen customer credentials and inflicted brand damage.

Dynamic Roles, Real Security: Why OnDemand Permissions Beat PreDefined Policies

How context‑aware, short‑lived roles eliminate privilege sprawl and accelerate secure engineering without overburdening admins Access management for remote resources has come a long way from VPNs and bastion hosts. The rise of cloud platforms, microservices and remote workforces has driven a shift toward Cloud-native security controls that integrate directly with AWS, Azure, GCP and Kubernetes.

APT-C-60 Exploits Zero-Day Vulnerabilities: Inside the SpyGlace Loader, COM Hijacking, and C2 Infrastructure

The cyber espionage landscape continues to evolve in sophistication and stealth—and among the more notable actors is APT-C-60. In recent months, this adversary has significantly escalated its tactics by leveraging zero-day vulnerabilities and orchestrating multi-stage campaigns to deploy the SpyGlace back-door.

Microsoft Help Desk Phishing Attempt

I received this email the other day to my personal email account. It is a “Security Alert” from “Microsoft Helpdesk.” Oh, my! Not only is Microsoft holding five emails headed to me, but my “subscription” is expiring on the same day. The “Unsubscribe” link was just a graphic, no URL. The URL to the main button, “Review All Held Messages results” was linked to the following path (shown below): That is clearly not Microsoft or microsoft.com.

LastPass Phishing Campaign Informs Users of Phony Death Notifications

A phishing campaign is targeting LastPass users with phony notifications informing users that someone has notified the company of the user’s death and is trying to gain access to their account. The emails have the subject line, “Legacy Request Opened (URGENT IF YOU ARE NOT DECEASED).” LastPass describes the following attack flow: Notably, the attackers are also calling recipients of the emails and posing as LastPass representatives, adding another layer of legitimacy to the campaign.

3 Truths About the Financial Sector's Digital Supply Chain Uncovered by Bitsight TRACE

When it comes to managing cyber risk, the financial sector is squarely at the top of the food chain. It’s simple economics (and the plot of many movies): financial institutions have the money, and cybercriminals are always looking for ways to take it. As a result, institutions have invested heavily in strengthening their internal systems and cybersecurity controls. Those investments have paid off.

Disconnected Access Explained: How Xona Protects Critical Systems Without Network Connectivity

Remote access isn’t optional in critical infrastructure anymore; it’s operationally essential. Whether for maintenance, OEM support, remote field work, or incident response, industrial organizations must enable access to critical systems. But, legacy access methods like VPNs, jump servers, and even agent-based Zero Trust or IT-based remote privileged access management (RPAM) tools all share one dangerous flaw: they implicitly trust the endpoint.