Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

8 Fraud and Risk Gaps Private Lenders Miss

Would it surprise you to learn that fraud is common in private lending? Probably not if you're in this business. But if you're not, here's what a recent LexisNexis report has revealed: not only is fraud common, but U.S. financial services firms lose $4.41 in costs for every $1 of fraud. This, by the way, is a 28% increase compared to 2022.

Top tips: What happens to your data after you delete an app?

Top tips is a weekly column where we highlight what’s trending in the tech world and share ways to stay ahead. This week, we’re uncovering the truth about app deletion, why removing an app from your phone doesn’t always mean your data is gone, and how to make sure your personal information doesn’t keep following you long after you’ve tapped uninstall. I recently found myself staring at my phone’s home screen. It felt cluttered.

Building a Global Regulatory Strategy with Threat Intelligence

Cybersecurity regulations are proliferating worldwide, but organisations are struggling to keep pace with the growing number of rules and risks. The growing maze of mandates, from the EU's Network and Information Security Directive 2 (NIS2) and the Digital Operational Resilience Act (DORA) to the US's Securities and Exchange Commission (SEC) disclosure rules, is creating fragmentation, complexity, and an urgent need for smarter compliance strategies.

AI SOC Market Landscape 2025: Torq Leads With Hyperautomation

The SACR 2025 AI SOC Market Landscape Report just dropped, and Torq was named one of the “most feature-rich platforms” on the market. Not because we bolted a chatbot onto triage. But because we’ve built an AI SOC platform modern security teams actually need: an AI-native, execution-first infrastructure that operationalizes intelligence at scale. And that platform works.

Exploiting API4 - 8 Real-World Unrestricted Resource Consumption Attack Scenarios (and How to Stop Them)

Unrestricted Resource Consumption (API4:2023) is the only threat category in the OWASP API Security Top 10 explicitly dedicated to Denial of Service (DoS) and resource abuse. But despite being just one category, attackers can exploit it in many different ways; from large file uploads and expensive GraphQL queries to abuse of metered third-party services like SMS gateways or AI/LLM APIs.

Introducing the Arctic Wolf AI Security Assistant: Providing Value for Security Operations for Beta Customers

Arctic Wolf recently introduced its AI Security Assistant, a cutting-edge generative AI security assistant designed to enhance security operations within the Aurora Platform. This innovative tool is now in beta and promises to deliver deeper security expertise instantly to users.

Building effective threat hunting and detection rules in Elastic Security

Learn to create custom detection rules in Elastic Security following real detection use cases. This blog will guide you through creating custom detection rules in Elastic Security, equipping you with best practices for using Elasticsearch Query Language (ES|QL) and Elastic AI Assistant to refine threat detection logic and add crucial context for analysts. You’ll learn how to effectively preview, test, and enhance your rules, ultimately strengthening your security operations.

How a volunteer-run wildfire site in Portugal stayed online during DDoS attacks

On July 31, 2025, just as Portugal entered the peak of another intense wildfire season, João Pina, also known as Tomahock, received an automated alert from Cloudflare. His volunteer-run project, fogos.pt, now a trusted source of real-time wildfire information for millions across Portugal, was under attack. One of the several alerts fogos.pt received related to the DDoS attack.