Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

FBI: Phishing Attacks Are Impersonating City and County Officials

The US Federal Bureau of Investigation (FBI) has issued an advisory warning of a phishing campaign that’s impersonating city and county officials to send phony requests for permit fees. “Individuals and businesses with active applications for land-use permits are being targeted by criminals impersonating city and county planning and zoning board officials, fraudulently requesting fees associated with these permits,” the FBI says.

The Next Phase of Enterprise Data Security: From Discovery to Control

Organizations today face a common challenge: sensitive data is everywhere. It lives across collaboration platforms, endpoints, databases, SaaS applications, and cloud storage systems. Employees and partners need to access and share information quickly, often across teams, organizations, and even countries. At the same time, regulatory requirements, security mandates, and privacy obligations demand stronger protection for sensitive data.

Announcing Cloudflare Account Abuse Protection: prevent fraudulent attacks from bots and humans

Today, Cloudflare is introducing a new suite of fraud prevention capabilities designed to stop account abuse before it starts. We've spent years empowering Cloudflare customers to protect their applications from automated attacks, but the threat landscape has evolved. The industrialization of hybrid automated-and-human abuse presents a complex security challenge to website owners.

When the M&A Deal Closes, Is Your Architecture Accelerating Time to Value?

Imagine two talented orchestras playing together, but without a conductor or a single score. You get noise, not music. M&A can be like that. The value lies in having every musician on the same page. Traditional networking slows M&A execution. Cato delivers a cloud-native foundation that securely connects the new organization from day one, aligns policies and workflows under a single framework, and helps leadership realize value faster.

The best compliance management software for 2026

In 2026, compliance work shouldn’t mean chasing screenshots, living in spreadsheets, or chaotic fire drills to get compliant. If you’re still tallying up hours upon hours of compliance work, it’s time to find a compliance management software that helps you automate compliance, manage risk, and prove trust. ‍ Not sure where to start?

How to evaluate cybersecurity and fintech platforms before trusting them with your data

When we think about cyberattacks, we often imagine a scene from a movie where someone in a dark room is typing 300 words per minute to bypass a firewall. The reality of cybersecurity is a lot more boring, and in a way, more dangerous. Most major data breaches today start with very mundane access paths. We're talking about basic credential theft, simple phishing emails, or weak account recovery flows that a teenager could figure out. Misconfigurations in cloud storage-where someone simply forgets to lock the digital door-routinely cause more damage than exotic, high-tech exploits.

How Scammers Use Travel SIM Sales to Steal Identity Documents

Most organisations spend serious money on firewalls, endpoint protection, and threat monitoring. Yet one of the most commonly exploited attack surfaces gets far less attention: the APIs quietly running underneath almost every modern application. APIs are the connective tissue of today's digital infrastructure. They allow apps to talk to each other, enable third-party integrations, and power the real-time data exchanges that businesses depend on daily. They are also a favourite target for attackers who know that many organisations have not secured them properly.

The Hidden Security Risks Living Inside Your APIs

Most organisations spend serious money on firewalls, endpoint protection, and threat monitoring. Yet one of the most commonly exploited attack surfaces gets far less attention: the APIs quietly running underneath almost every modern application. APIs are the connective tissue of today's digital infrastructure. They allow apps to talk to each other, enable third-party integrations, and power the real-time data exchanges that businesses depend on daily. They are also a favourite target for attackers who know that many organisations have not secured them properly.

DDI Central 6.1: Enhanced IPAM visibility, root hint templates, trusted feeds in threat intelligence, and more

Previously, DDI Central version 6.0 introduced several enhancements designed to elevate the administrative experience, including streamlined importing of multiple servers in Windows environments, granular control over network resources through hierarchical roles, and a more in-depth view of network clusters. Now, DDI Central version 6.1 delivers broader and more comprehensive visibility into IP Address Management, featuring enhanced segmentation and multiple viewing options.

The Dependency Dilemma: Balancing Innovation Speed with Supply Chain Resilience

Development teams are shipping faster than ever. Generative AI coding assistants, early agentic workflows, and increasingly modular architectures have compressed the distance between concept and deployment. AI-enabled innovation has become an executive mandate, and teams are expected to deliver at speed without sacrificing security or compliance.