Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Cloudflare meets new Global Cross-Border Privacy (CBPR) standards

Cloudflare proudly leads the way with our approach to data privacy and the protection of personal information, and we’ve been an ardent supporter of the need for the free flow of data across jurisdictional borders. So today, on Data Privacy Day (also known internationally as Data Protection Day), we’re happy to announce that we’re adding our fourth and fifth privacy validations, and this time, they are global firsts!

AI Powered Remediation: Mend SAST Performs +46% Better Than Competitors

Security teams face limited resources and a growing attack surface while developers struggle with security responsibilities that feel burdensome, annoying, or seem to conflict with their first priorities. AppSec teams turn to static application security testing (SAST) tools to identify vulnerabilities in first-party code early in the software development lifecycle while developers can still fix issues before the code is old and forgotten about.

CrowdStrike Extends Powerful Falcon Platform Capabilities into Red Hat OpenShift

Kubernetes has become the cornerstone of modern DevOps, empowering teams to quickly deploy, manage, and scale containerized applications. However, many struggle to navigate Kubernetes' complexity while operating across hybrid and multi-cloud environments. Red Hat OpenShift builds on Kubernetes by providing a consistent, enterprise-grade platform that abstracts the intricacies of the underlying infrastructure. It’s trusted by customers across industries and around the globe.

Microsoft is Still the Most Commonly Impersonated Brand in Phishing Attacks

Microsoft, Apple, and Google were the most commonly impersonated brands in phishing attacks last quarter, according to researchers at Check Point. “Microsoft retained its dominance as the most imitated brand in phishing schemes, accounting for a staggering 32% of all attempts,” Check Point says. “Apple followed with 12%, while Google ranked third. Notably, LinkedIn reentered the list at fourth place, emphasizing the persistent targeting of technology and Social Network brands.

DeepSeek: The Silent AI Takeover That Could Cripple Markets and Fuel China's Cyberwarfare

Unlike Western AI systems governed by privacy laws and ethical considerations, DeepSeek operates under a regime notorious for state-sponsored hacking, surveillance, and cyber espionage. With AI-driven automation at its disposal, China can rapidly scale its cyberattacks, embedding malware, manipulating financial markets, and eroding trust in global AI platforms.

Debugging Connectivity in Calico eBPF: The Mysterious bpfDataIfaceRegexp & co.

The eBPF dataplane differs from traditional Linux dataplane in many ways, with its structure largely dictated by the location of the so-called eBPF hooks inside the kernel – locations where developers can inject their eBPF programs to change default kernel behavior.

Fortinet Firewall Authentication Bypass Vulnerability (CVE-2024-55591)

As per a recent update from Fortinet, Exploitation of CVE-2024-55591, a recently disclosed authentication bypass vulnerability in FortiOS and FortiProxy, allows remote attackers to achieve super-admin privileges. By sending specially crafted requests to the Node.js WebSocket module, attackers can exploit this zero-day vulnerability to gain unauthorized access.

The Best Enterprise Security Strategies in 2025

Enterprises and businesses are constantly fighting against cyber threats and hackers that threaten to steal their data. So much so that in 2024, organizations increased their cybersecurity budget by 8%, a 2% increase from 2023. Despite this, the cost of a data breach continues to increase each year, reaching its highest last year, when the average cost of a data breach reached $4.88 million.

Why you need to secure your digital supply chain in 2025

Digital supply chain attacks are happening more often, inflicting widespread damage and threatening your future operations. Here’s one simple solution. How would you know if your digital supply chain is under attack? From aerospace and defense projects to engineering and infrastructure programs, modern manufacturing processes rely on digital supply chains. These interconnected cloud highways streamline production workflows and improve efficiency across the supply chain.