Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Guarding open-source AI: Key takeaways from DeepSeek's security breach

In January 2025, within just a week of its global release, DeepSeek faced a wave of sophisticated cyberattacks. Organizations building open-source AI models and platforms are now rethinking their security strategies as they witness the unfolding consequences of DeepSeek’s vulnerabilities. The attack involved well-organized jailbreaking and DDoS assaults, according to security researchers, revealing just how quickly open platforms can be targeted.

Gcore Radar report reveals 56% year-on-year increase in DDoS attacks

Gcore, the global edge AI, cloud, network, and security solutions provider, today announced the findings of its Q3-Q4 2024 Radar report into DDoS attack trends. DDoS attacks have reached unprecedented scale and disruption in 2024, and businesses need to act fast to protect themselves from this evolving threat. The report reveals a significant escalation in the total number of DDoS attacks and their magnitude, measured in terabits per second (Tbps).

Comprehensive PowerShell Commenting Guide

If you write Windows PowerShell scripts, it’s important to understand how to use PowerShell comments effectively. This article can help. It explains the key ways you can include comments in your scripts and provides guidance for when to use each method. It also explains popular use cases for comments and offers best practices to follow and common mistakes to avoid.

Introducing Workflows: Automate Vulnerability Triage While Staying Focused on Real Risks

Security teams and developers are drowning in product security alerts. Every security scan generates a flood of issues, and manually reviewing, prioritizing, and assigning each one is time-consuming and inefficient. The result? Critical risks get buried in long backlogs, while developers waste time chasing issues that don’t actually introduce real risk.

Benefits of moving to SaaS IAM solutions

Once upon a time, ordering software would involve a physical delivery with a manual setup and availability on designated machines. The rise of cloud technology changed all that, with subscription-based SaaS growing 300% during 2012–2018. This shift in business model, from owning software to renting it, also meant a change in provisioning. Instead of relying on internal resources and expertise, organizations could simply tap into their external partners and providers.

Random but Memorable - Episode 14.2: Microphone Sharing Browser Fans with Vivek Ramachandran

What’s GhostGPT? This episode, we unpacked the new cybercrime AI being used by hackers. We also serve-up our best tips for secure tax-filing to help you survive tax-season in. If that wasn’t enough, we also invite Founder of SquareX, Vivek Ramachandran, to teach us how we can easily find and eliminate browser security risks. Hit play to find out how the browser landscape has changed in recent years, and how SquareX can help detect and mitigate new and traditional web attacks.

Leveraging CloudCasa to Simplify Upgrades and Enhance Backup for Azure Local

As the Kubernetes ecosystem grows and evolves, the need for robust data protection and streamlined management in hybrid and edge environments has never been greater. Microsoft’s Azure Local platform has become a critical solution for deploying and managing Kubernetes, and in particular Azure Kubernetes Service (AKS), in these environments.

BDRCloud is Now Live - A Cloud-Hosted Backup Solution Built for MSPs to Maximize Profit Margins and Increase Recurring Revenue

We’re excited to announce the official launch of BDRCloud, a cloud-hosted backup and recovery platform designed exclusively for Managed Service Providers (MSPs). After a successful beta phase, BDRCloud is now production-ready, offering cost-effective, scalable, and secure backup solutions that empower MSPs to deliver profitable and reliable Backup-as-a-Service (BaaS). Here’s a quick look at what’s in-store with BDRCloud.

What is the Digital Operational Resilience Act (DORA)? Everything you need to know

The Digital Operational Resilience Act (DORA) is a comprehensive EU regulation aimed at financial entities and their third-party information and communications technology (ICT) providers. ‍ As a new and largely unexplored regulation, many affected organizations are still in the process of aligning their cybersecurity and risk management processes with the framework.