Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

AI-Powered Attacks Surge: 1,025% Jump in Vulnerabilities, 99% are API related

Wallarm's 2025 API ThreatStats Report offers a sweeping look at how AI deployments drive a surge in security risks. In 2024, Wallarm researchers discovered 439 AI-related CVEs-up an astonishing 1,025% from the prior year. Nearly all these flaws, 99%, point back to insecure or mismanaged APIs.

How Apple is Battling Phishing Scams and Protecting Your Personal Data

The digital world is now facing a serious challenge of phishing where fraudsters employ fake emails, websites or links to get confidential data which can result into great losses if not well handled. Apple, however, has taken several steps to protect users from these attacks.

Common Mistakes Companies Make When Implementing GDPR Policies

The General Data Protection Regulation (GDPR) has set a high standard for data protection and privacy in the European Union, impacting businesses worldwide. While most companies recognize the importance of compliance, many make critical mistakes during implementation, leaving them vulnerable to fines and reputational damage. Here are some of the most common pitfalls and how to avoid them.

Nearly Three-Quarters of UK Education Orgs Have Sustained Cyberattacks

73% of educational institutions in the UK have sustained at least one cyberattack or breach in the past five years, according to researchers at ESET. Additionally, a fifth of these organizations said they’ve experienced three or more cyberattacks. 43% of the organizations surveyed cited phishing attacks as their top concern.

Vulnerability management in the microservice era: From zero to hero

In the world of cloud-native applications, microservices and Kubernetes have become the backbone of modern software architecture. The scalability, flexibility, and orchestration capabilities provided by Kubernetes have revolutionized how applications are built and managed. However, like any powerful tool, Kubernetes introduces complexity, and with complexity comes risk — particularly in the form of security vulnerabilities.

Trustwave SpiderLabs December 2024: Phishing and Email Security Insights

There was some good, bad, and neutral news when it comes to email threats in December 2024, according to new data compiled by Trustwave SpiderLabs’ MailMarshal email security team. Trustwave SpiderLabs’ PageML, which is used in MailMarshal’s Blended Threat Module (BTM), flagged 19 million malicious URLs for VirusTotal, of which 2.2 million detections were only picked up by Trustwave. The team reported that 25% of all incoming spam emails were in fact phishing attacks of some type.

"SOAR isn't obsolete, it's just maturing": Tracking SOAR's AI evolution with Tines and GigaOm

In a recent webinar on SOAR’s evolving role in security and beyond, I chatted with Andrew Green, Networking & Security Research Analyst at GigaOm. We kicked things off with a brief discussion on Gartner’s Hype Cycle for ITSM report, which described the SOAR category as “obsolete” and prompted some commenters to declare that SOAR is “dead”.

Importance of Speed in Threat Intelligence

The threat landscape is evolving at an unprecedented rate, with organisations facing increasingly complex and malicious cyber threats. As cyber-attacks grow in frequency and sophistication, Cyber Threat Intelligence (CTI) has emerged as a critical focus for many organisations striving to counter these rising challenges effectively.