Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Pegasus Spyware Email Scam: How to Detect and Protect Yourself

Among today's rising cyber threats, Pegasus spyware email has become one of the most famous names among the latest threats. Pegasus is a malware spy tool developed for extensive surveillance but has now been turned into the new wave of scams exerted by cybercriminals, especially through Pegasus spyware scam mails used to extort money from victims, claiming their devices had been hacked.

CompassDRP Social Media integration: Six real-world use cases

Social media can work both for and against an organization, so it’s worth treating these sites as extensions of your attack surface. CompassDRP’s Social Media integration continuously monitors both corporate and employee profiles across platforms such as Twitter, LinkedIn, and Facebook. It automatically flags unauthorized or impersonating accounts that mimic executive identities or misuse company branding, helping to thwart phishing and fraud campaigns before they gain traction.

Introducing Full Workload Inventory Visibility in ARMO: See What's Running, What It's Doing, and How It's Protected

At ARMO, our mission is to make Kubernetes security more accessible, actionable, and effective. That’s why we’re excited to launch a major upgrade to our platform: Full Workload Inventory Visibility. This powerful new capability helps security and platform teams answer the question at the core of Kubernetes security.

EP 11 - The calm CISO: Strength under pressure

What does it take to stay calm in the face of constant cyber pressure—and why does that mindset matter more than ever? In this episode of Security Matters, host David Puner speaks with Den Jones, founder and CEO of 909Cyber, about his transition from enterprise chief security officer (CSO) to cybersecurity consultant.

Addressing Recent Vulnerabilities and Our Commitment to Security

At CyberArk, the trust and security of our customers are at the heart of everything we do. Today, July 15th, we are addressing the publication of several Common Vulnerabilities and Exposures (CVEs) related to CyberArk Secrets Manager, Self-Hosted (formerly Conjur Enterprise) and Conjur Open Source (OSS). We regret the challenges this situation may pose to our customers and reaffirm our commitment to supporting them through the resolution process.

Understanding the Core Benefits of Stablecoins for Payments and Remittance Companies

When I joined Fireblocks ten months ago, stablecoins were just starting to break into the payments conversation. Today, that conversation is everywhere. At Stablecon 2025 and in one-on-one conversations with PSPs, global marketplaces, and fintech leaders, I’ve seen the shift firsthand: stablecoins have crossed the chasm. In 2024 alone, Fireblocks infrastructure facilitated over $1.5 trillion in stablecoin transaction volume.

Hyper-volumetric DDoS attacks skyrocket: Cloudflare's 2025 Q2 DDoS threat report

Welcome to the 22nd edition of the Cloudflare DDoS Threat Report. Published quarterly, this report offers a comprehensive analysis of the evolving threat landscape of Distributed Denial of Service (DDoS) attacks based on data from the Cloudflare network. In this edition, we focus on the second quarter of 2025. June was the busiest month for DDoS attacks in 2025 Q2, accounting for nearly 38% of all observed activity.

Cloudflare recognized as a Visionary in 2025 Gartner Magic Quadrant for SASE Platforms

We are thrilled to announce that Cloudflare has been named a Visionary in the 2025 Gartner Magic Quadrant for Secure Access Service Edge (SASE) Platforms1 report. We view this evaluation as a significant recognition of our strategy to help connect and secure workspace security and coffee shop networking through our unique connectivity cloud approach. You can read more about our position in the report here.

HIPAA violations in 2025: Staff mistakes and vendor blind spots

HIPAA violations don’t always come from malicious attacks or headline-making data breaches. More often, they stem from everyday mistakes, like misdirected emails and vendors that aren’t as secure as they seem. Even small slip-ups can expose protected health information (PHI) and invite major consequences. ‍ In today’s complex compliance landscape, those mistakes are alarmingly common.