Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Living Security Unveils HRMCon 2025 Speakers as Report Finds Firms Detect Just 19% of Human Risk

Living Security, a global leader in Human Risk Management (HRM), today announced the full speaker lineup for the Human Risk Management Conference (HRMCon 2025), taking place October 20, 2025, at Austin's Q2 Stadium and virtually worldwide.

180,000 ICS/OT Devices and Counting: The Unforgivable Exposure

Remember when ICS malware was “rare”? Last year we got two new families built for one thing: disruption. FrostyGoop and Fuxnet are not Mirai with a wrench taped on or your typical DDoS botnet. They were built to target and disable devices that use Meter-bus and Modbus protocols, inflicting maximum damage. If you still believe that “our PLCs aren’t on the Internet,” then this is your nudge to actually go and check.

CISA Advisory: CVE-2025-20333 for Cisco Firewall Devices

CVE-2025-20333 is a critical, actively exploited zero-day vulnerability impacting Cisco firewall devices, specifically those running unpatched versions of Cisco Adaptive Security Appliance (ASA) and Firewall Threat Defense (FTD) software. It is one of two zero-days currently being weaponized by cyber threat actors, posing a significant and immediate threat to enterprise network perimeters. The vulnerability has a CVSS score of base 9.9. At this time, NVD has not released a formal entry for CVE-2025-20333.

Master quantitative risk analysis: A step-by-step guide for better business decisions

Risk is an ever-present factor in business, influencing almost every decision that organizations make. From investments and operations to market expansion and product development, every decision carries with it inherent risks that could either be mitigated or amplified based on how well they are understood and managed. Quantitative risk analysis offers a structured, data-driven approach to assess these risks, paving the way toward more informed and resilient business decisions.

The hidden security risks of slow mobile WordPress sites

Mobile lag masks threats. When pages stall, admins postpone updates, logs grow noisy, and attackers get more tries. Treat WordPress security as a performance problem too, because mobile site speed directly shapes your risk. Harden your stack and cut the mobile attack surface, start with mobile optimization for WordPress websites.

AI, Risk, and Enterprise Security: Highlights from a Discussion with Enrique Salem

Key insights from a fireside chat between Nightfall CEO Rohan Sathe and cybersecurity veteran Enrique Salem, Partner at BCV and Nightfall investor Twenty years ago, enterprise security teams scrambled to address shadow IT as employees brought consumer applications into the workplace. Today, we're witnessing the same phenomenon with AI tools—what we now call shadow AI. The fundamental question remains unchanged: What happens to our data?

From Ransomware to Exposed ATMs: How Adversaries Target Financial Institutions

The financial sector remains one of the most targeted industries for cybercriminals and nation-state actors due to the sensitivity of customer data, the high value of financial transactions, and the critical role these institutions play in global stability. Bitsight’s 2025 State of the Underground report found that underground markets listed nearly 14.5 million compromised credit cards in 2024, representing a 20% increase over 2023. This growth was driven entirely by a surge in US-issued cards.

Grounded: The ARINC vMUSE Attack Disrupting Multiple Airports

The line between the digital and physical worlds blurs completely when a cyber attack results in widespread, tangible disruption. For thousands of travelers, this became a harsh reality when major European airports were forced to delay flights due to a ransomware attack targeting a vendor in the supply chain.

Cyber Risk Monitoring for ISACs: An Innovative, Collaborative Approach to Third-Party Management

BlueVoyant recently announced its strategic partnership with the Automotive Information Sharing and Analysis Center (Auto-ISAC), the central organization for cybersecurity collaboration in the automotive industry. Information Sharing and Analysis Centers (ISACs) are important organizations that provide a central resource within a given sector for gathering, analyzing, and sharing information on cyber threats and vulnerabilities.