Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Public Sector Ransomware Attacks Relentlessly Continue

In 2025, 36 years after the first ransomware attack was recorded, actors continue to zero in on the public sector, and there is no evidence they will slow down any time soon. In fact, our numbers suggest that ransomware attacks against government organizations are ramping up, causing crippling service outages, massive data loss, reputational damage, public distrust, and financial harm.

From Path Traversal to Supply Chain Compromise: Breaking MCP Server Hosting

We found a path traversal vulnerability in Smithery.ai that compromised over 3,000 MCP servers and exposed thousands of API keys. Here's how a single Docker build bug nearly triggered one of the largest AI supply chain attacks to date.

Why We Built Evo - From My Heart

I’ve spent my career building and defending. I’ve seen the beauty of innovation and the brutality of cyber warfare. I’ve sat shoulder-to-shoulder with security engineers and platform teams in the trenches at 3AM responding to state-backed attacks where context and speed meant survival. In those moments, one truth becomes painfully clear: With AI, that gap just became a chasm. Agentic AI didn’t bend the rules of software — it rewrote them. Code now evolves in real time.

Are We Failing to Secure Files? Attackers Aren't Failing to Check

According to a new Ponemon study, weak file protections now account for several cybersecurity incidents a year for many organizations. Unsafe file-sharing practices, malicious vendor files, weak access controls, and obscured file activity are largely to blame. File Integrity Monitoring (FIM) could be the solution.

JFrog Named as a Visionary in the 2025 Gartner Magic QuadrantTM for Application Security Testing

We’re excited to announce that Gartner has named JFrog a ‘Visionary’ in the 2025 Magic QuadrantTM for Application Security Testing. We believe this reflects JFrog’s forward thinking strategy of integrating application security seamlessly throughout the entire software development lifecycle in ways that help organizations deliver their most secure, trusted applications without impacting developers’ productivity.

Resilience After the Breach: 6 Cyber Incident Response Best Practices

In its 2025 State of the Underground report, Bitsight TRACE found that ransomware activity continued to escalate in 2024, with a 25% increase in unique victims listed on leak sites and a 53% increase in the number of ransomware group-operated leak sites. The report also observed a 43% increase in data breaches shared on underground forums, with nearly one in five victims based in the United States. These findings highlight a continued upward trend in cyberattack activity.

Attackers Abuse Grok to Spread Phishing Links

Threat actors are abusing X’s generative AI bot Grok to spread phishing links, according to researchers at ESET. The attackers achieve this by tricking Grok into thinking it’s answering a question, and providing a link in its answer. “In this attack campaign, threat actors circumvent X’s ban on links in promoted posts (designed to fight malvertising) by running video card posts featuring clickbait videos,” ESET says.

Building Trust in the Digital Age: How Financial Services Can Balance Security and Speed

In the high-stakes world of financial services, trust is the cornerstone of every client relationship. But here's the challenge that keeps financial leaders up at night: how do you maintain the stringent security clients demand while delivering the rapid response they expect? It's a delicate balancing act that has become increasingly complex in our digital-first world. The reality is stark. A data breach can trigger a mass exodus, with 33% of clients saying they'd switch providers after a data incident.