Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Business of Malware: Inside the MaaS Economy

In our 2025 State of the Underground report, we found that 384 unique varieties of malware were sold across the top three criminal forums in 2024, a 10% increase from 349 in 2023, signifying an expansion in the underground malware marketplace. These figures reflect malware explicitly offered for sale (not shared freely), and each distinct version or naming variation is counted independently.

AI Agents Complicate GRC

The challenge isn’t just that AI agents are new. It’s that they blur traditional boundaries of data control, creating hidden sub-processors and uncontrolled data flows. For CISOs, compliance officers, and security leaders, this presents a fundamental governance problem: if you don’t know which AI services are touching your data, you cannot prove compliance.

Black Hat 2025 - From Chaos to Control - How Bank Of Hope Achieved Zero Critical Vulnerabilities

At Black Hat 2025, Nucleus Security and Bank of Hope shared how a small but determined security team transformed its vulnerability management program into a risk-driven, automated operation.

Attaxion Releases Agentless Traffic Monitoring for Immediate Risk Prioritization

Attaxion announces the addition of the Agentless Traffic Monitoring capability to its exposure management platform. Agentless Traffic Monitoring is a new capability designed to give cybersecurity teams actionable visibility into network traffic flowing to and from their digital assets - all without the need to deploy any agents or sensors on these assets.

AI and Fraud Detection: How Bank Reconciliation Tools Protect Your Cash

Fraud has always been a concern in business, but the digital economy has amplified both the scale and sophistication of fraudulent activities. From false vendor payments to suspicious cash transfers, threats are no longer isolated incidents; they're systemic risks that can affect an organization's cash flow. At the same time, finance teams are under immense pressure to deliver timely, accurate reporting while ensuring compliance, where manual processes, spreadsheet errors, and delayed reconciliations leave organizations vulnerable to undetected fraud.

How Cybersecurity Professionals Can Leverage App Reviews for Risk Insights

Cybersecurity analysts often narrow their attention to system logs, performance alerts, and other system logs. Even though these sources are essential, they are not the only sources that need attention. Feedback left by users, particularly on app stores, tends to go unnoticed. This is because the app stores are not only tools to distribute applications; they are invaluable stores of behavioral and experiential intelligence. For security professionals, App Reviews and Ratings can serve as an advanced warning system that highlights possible risks, unwanted activity, or security issues long before technical tools can uncover them.

State of third-party risk management: Expert insights and the path forward

In today’s fast-moving digital economy, growth depends on strong, trusted relationships with vendors, suppliers, and partners. These third parties are often essential to modern business operations; however, they also open the door to a range of risks, from regulatory fines to operational slowdowns. Many organizations have already felt the impact of these risks becoming reality firsthand.

Link11 Highlights Growing Cybersecurity Risks and Introduces Integrated WAAP Platform

Link11, a Germany-based global IT security provider, has released insights into the evolving cybersecurity threat landscape and announced the capabilities of its Web Application and API Protection (WAAP) platform, designed to provide multi-layered defenses against modern digital threats.

The ABCs of "ishing": From Phishing to Quishing

It’s no secret that in cybersecurity, many attacks begin with some form of “‑ishing.” But what exactly are these tactics and who’s behind them? From classic phishing emails to more advanced impersonation schemes using AI and social platforms, attackers continue to evolve their methods to exploit human behavior. Understanding the full spectrum of “‑ishing” techniques is critical for organizations looking to protect their people, data, and reputation.