Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

20 Data Exfiltration Examples Every Business Should Know

Businesses across all sectors, from finance to healthcare, hold valuable company data and intellectual property relating to their operations, employees, and customers. But this data has become a prime target for bad actors, including cybercriminals and malicious insiders who are constantly finding new ways to steal it for profit or harm.

Understanding NIST AI RMF 1.0 and How AppTrana WAAP Strengthens AI Risk Management

AI systems depend heavily on secure web applications, APIs, and third-party data sources, but these interfaces are often the most exposed and exploited. The NIST AI Risk Management Framework (AI RMF 1.0) helps organizations govern, map, measure, and manage AI-related risks comprehensively.

Beyond Block: Rethinking AI Crawler Policies

Why blocking should always be the final step, not the first instinct Artificial intelligence has changed the way people discover information online. Instead of scrolling through ten blue links, millions now ask chat assistants for instant answers. Those assistants rely on automated software known as AI crawlers. These crawlers visit public websites, collect text, code, and metadata, and then feed that material into large language models.

Before the Breach: Why You Need an IR Retainer Like a Golfer Needs a Caddie

An incident response retainer isn’t just a contract, it’s a relationship. It sets expectations, defines access methods, outlines pricing, and ensures your team and your IR partner are already speaking the same language.

CVE-2025-47812: Wing FTP Server Remote Code Execution Vulnerability Exploited in the Wild

On July 10, 2025, a technical article was published by Huntress revealing that a maximum severity remote code execution vulnerability in Wing FTP Server, CVE-2025-47812, had been actively exploited by threat actors as early as July 1, 2025. Details of the vulnerability had originally been published on June 30, 2025, providing a comprehensive breakdown of the flaw and how to exploit it.

CVE-2025-25257: Critical Unauthenticated SQL Injection Vulnerability in FortiWeb

On July 8, 2025, Fortinet released fixes for a critical vulnerability in FortiWeb that could allow an unauthenticated threat actor to execute SQL commands via crafted HTTP or HTTPS requests, tracked as CVE-2025-25257. The flaw lies in the Graphical User Interface (GUI) component and stems from improper neutralization of special elements used in SQL statements. The vulnerability was discovered by a security researcher and responsibly disclosed to Fortinet.

3 Considerations for Navigating Australian IRAP Assessments

Aligning with the Australian Government’s expectations for cybersecurity can present challenges, especially for organizations unfamiliar with the frameworks in use. For those looking to work with or support government programs, understanding how systems are assessed against the Information Security Manual (ISM) is critical. The ISM, maintained by the Australian Signals Directorate (ASD), sets out cybersecurity principles to guide the protection of government information and systems.

You've Embraced Kubernetes. Now Comes the Hard Part: Protecting Kubernetes

You’ve made the leap. Kubernetes is up and running. You’ve reduced your hypervisor footprint, containerized your workloads, and unlocked new levels of agility. But now the Day 1 operations are behind you—the real challenge surfaces: protecting Kubernetes. How do you protect this dynamic, fast-moving environment without slowing down your team, racking up hidden costs, or duct-taping together a fragile backup system?

Choosing a DDoS Mitigation Strategy: How NDR Helps Identify and Contain DDoS Attempts

In today’s digital battlefield, distributed denial-of-service (DDoS) attacks remain one of the most disruptive tactics used by threat actors. These attacks are not just about overwhelming servers they’re about business downtime, customer dissatisfaction, and reputation loss. With the increasing complexity of attack vectors, traditional DDoS mitigation strategies are no longer enough. Enterprises must adopt smarter, faster, and more adaptive ways to detect and mitigate DDoS attacks.

Alert: Scattered Spider is Targeting the Aviation Sector

The US FBI and cybersecurity experts are warning that the Scattered Spider extortion gang has shifted its focus to the aviation and transportation sectors, BleepingComputer reports. The group spent the past several months targeting companies in the retail and insurance sectors, and has now hit several airlines. Scattered Spider uses social engineering attacks to gain initial access, then steals data and/or deploys ransomware to extort their victims.