Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The F5 BIG-IP Source Code Breach

On August 9, F5 discovered that multiple systems were compromised by what it is calling a "highly sophisticated nation-state threat actor" who maintained "long-term, persistent access to certain F5 systems". These included the BIG-IP product development environment and engineering knowledge management platform. That access allowed for the exfiltration of portions of F5's BIG-IP source code as well as information about undisclosed BIG-IP vulnerabilities F5 was working on.

Reflections from the AI Agent Security Summit in San Francisco

Last week, I had the honor of emceeing the AI Agent Security Summit in San Francisco, a gathering of some of the brightest minds exploring the intersection of artificial intelligence, security, and human responsibility. Having moderated a panel at the first Summit in New York City earlier this year, stepping into the emcee role this time around was a different experience, but just as enjoyable. On-demand recordings of the sessions will be available soon.

How Falcon Exposure Management's ExPRT.AI Predicts What Attackers Will Exploit

Nearly 40,000 vulnerabilities were disclosed in 2024.1 Security teams are overwhelmed, especially those relying on outdated tools. ExPRT.AI, the native intelligence engine embedded in CrowdStrike Falcon Exposure Management, is built to help teams prioritize which vulnerabilities are most urgent for them.

Salesforce breach escalates: Qantas & Vietnam Airlines data leaked on dark web

The recent developments surrounding the Salesforce data breach serve as a stark reminder of the persistent threats organizations face. What began as a concerning incident earlier this summer has now escalated dramatically, with threat actors following through on their threats and releasing a substantial trove of Qantas customer data to the public.

Phishing Remains the Top Initial Access Vector in Cyberattacks Across Europe

Phishing was the initial access vector for 60% of cyberattacks across Europe between July 2024 and June 2025, according to the European Union Agency for Cybersecurity (ENISA). “With regards to the primary method for initial intrusion, phishing (including vishing, malspam and malvertising) is identified as the leading vector, accounting for about 60% of observed cases,” the agency says.

Why Fireblocks is the Best Crypto Staking Platform for Institutional Users

If you’re searching for the best crypto staking platform to deploy institutional capital, security and operational flexibility are non-negotiable. In this post, we’ll explain why Fireblocks is a compelling choice among crypto staking platforms, how its staking capabilities work in practice, and how it compares to alternative institutional solutions.

From Alert to Full Containment: Why Top Flite MDR Requires Elite Threat Intelligence and Incident Response

Trustwave, A LevelBlue Company, is justifiably proud of its Managed Detection and Response (MDR) solution. Trustwave MDR is an analyst recognized vendor in the MDR space having just been named as a Leader in the Leader the IDC MarketScape: Asia/Pacific Managed Detection and Response Services 2025 and has a long list of MDR accolades and awards filling our award shelves. The reason Trustwave is so frequently called out from other MDR providers is our differentiating factors.

What Are Pretexting Scams? How To Prevent Them?

Cybercrime continues to grow and become more lethal. Cybercriminals constantly look for new ways to trick people and steal their valuable data. One of the popular methods they are using these days is ‘Pretexting’. Pretexting scams are based on attackers fabricating a false story or pretense to gain the trust of innocent people.

Is PAM Difficult To Implement?

Privileged Access Management (PAM) is crucial for protecting an organization’s most critical systems and sensitive data against both internal and external cyber threats. Despite its importance, many IT and security teams perceive PAM implementation as challenging due to complexity, lack of resources or poor user adoption. While legacy PAM solutions have been known to be difficult to implement, modern solutions like KeeperPAM are changing the process by making PAM more streamlined and scalable.