Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Using ITDR to Protect Non-Human Identities

Non-human identities. It seems like every technology conference that I’ve attended over the past year or so has had NHIs as a primary topic. And it’s no wonder. What have become powerful tools in the new world of hyper-automation, dynamic IT infrastructures, and complex security processes, have also led to new vulnerabilities within many IT environments. For just a moment, let’s look at why NHIs are important to focus on from a security perspective. I have 3 primary vulnerabilities.

Automating security questionnaires with open APIs: Trends in 2025

In this article Chief information security officers (CISOs) are continually tasked with understanding and deploying innovative solutions that reduce risk while increasing operational efficiency. As organizations expand their reliance on digital data and cloud-based infrastructures, the volume and complexity of security questionnaires have grown exponentially. In this environment, modernizing and streamlining these questionnaires is not simply about efficiency; it is a strategic imperative.

The Link Between Asset Classification and Threat Response Accuracy

The cybersecurity landscape continues to evolve at an unprecedented pace, with organizations facing increasingly sophisticated threats targeting their most valuable resources. In this environment, the accuracy and speed of threat response can determine the difference between a minor security incident and a catastrophic data breach. The fundamental truth: organizations cannot adequately protect what they cannot properly identify and classify.

Understanding Trustwave's Australia IRAP Assessment Services: A Comprehensive Guide

It's not news that keeping an organization's information and communication technology (ICT) systems safe and sound is absolutely critical. That's where the Information Security Registered Assessors Programme (IRAP), run by the Australian Signals Directorate (ASD), comes in. It’s an excellent programme and one that Trustwave highly recommends. To help organizations align with this process, Trustwave now has an IRAP Assessment Service available.

Preventing Data Poisoning in Training Pipelines Without Killing Innovation

Data poisoning occurs when cyber criminals intentionally compromise the integrity of a data set used for training machine learning models. They corrupt the information to manipulate the model’s outcome in the form of incorrect predictions by introducing vulnerabilities that reduce the effectiveness, add security risks, and fundamentally shape its decision making capabilities.

Cato CTRL Threat Research: New Streamlit Vulnerability Enables Cloud Account Takeover Attack and Stock Market Dashboard Tampering

Imagine financial analysts watching stock prices suddenly drop. Dashboards show misaligned data, market confidence disappears, and trading screens across the NASDAQ turn red. But this time, the disruption isn’t caused by politics or economic shifts. It starts with a cyberattack. We reveal how a simple and overlooked flaw in Streamlit’s file upload feature, part of a widely used open-source framework for building stock market dashboards, could be used to cause this kind of financial chaos.

API Security Attack Vectors (2025): A Complete Guide

APIs run the show today. Whether it’s a mobile app fetching user data, a SaaS platform integrating with Stripe, or a microservice coordinating with ten others, APIs are the glue and the backbone. This is something that attackers are notoriously aware of. The challenge? Most security tooling still operates on a page-view and form-based model. It can’t view the business logic of API calls, like knowing who is supposed to do what on what object and in what context.

Top VAPT Service Providers for ABHA

As of February 6, 2025, India has over 740 million Ayushman Bharat Health accounts(ABHA), and close to 500 million health records linked with ABHA. Moreover, this architecture caters to more than 1,59,000 healthcare facilities and the personal data of over 6,00,000 professionals (under the HPR), respectively, with five digital foundational pillars.

External Attack Surface Management (EASM): A Guide for Devs & Security Engineers

If you’re part of a cloud-first organization, building in fintech, healthcare, SaaS, or any environment where infrastructure shifts fast and data matters, external risk isn’t theoretical; it’s operational, with breach patterns evolving and compliance expectations tightening, visibility into what you’ve exposed online is no longer optional.

CrowdStrike 2025 Threat Hunting Report: AI Becomes a Weapon and a Target

Today’s enterprising adversaries are weaponizing AI to scale operations, accelerate attacks, and target the autonomous AI agents quickly transforming modern businesses. The CrowdStrike 2025 Threat Hunting Report details this new chapter in the threat landscape. This year’s report, based on frontline intelligence from CrowdStrike’s elite threat hunters and intelligence analysts, examines how threat actors are using AI to do more with less.