Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A Pressing Matter Part I - The Simplification of Ransomware Crime Development Through Cybercriminal Forums

Five centuries after the printing press was invented, the digital age began. With significant revolutions in knowledge dissemination, the era taking place now has seen vast amounts of information become instantly accessible. Whilst this is generally seen as a positive in most countries worldwide, malicious intentions persist across the digital world.

Credential Theft Campaign Targets Legal Sector via Spoofed Emails Delivering Malicious HTM File Mimicking O365 Login Page

Arctic Wolf has recently observed a campaign targeting the legal industry using a combination of brute-force and spearphishing techniques. Threat actors initially attempted to brute-force multiple user accounts. After those efforts were unsuccessful, they pivoted to spearphishing by sending spoofed emails that appeared to originate from internal users. These emails used the subject line “Reminder-Your-to-do-list” and contained a malicious.HTM attachment.

Inside Qilin's New Legal Pressure Tactic: How 'Call a Lawyer' Increases Ransomware Success

In the cybercrime ecosystem, innovation often comes in disturbing forms. The ransomware group Qilin—already notorious for offering a full suite of extortion tools to affiliates—has introduced a new feature that elevates psychological warfare to a new level: a “Call a Lawyer” button. This isn’t satire. This is real social engineering, now backed with actual legal threats.

How Secure Is WhatsApp in 2025? [Appknox's Pentesters Reveal 5 Critical Vulnerabilities]

June 2025 has seen WhatsApp back in the headlines—this time for all the wrong reasons. Earlier this month, The National broke the story: WhatsApp’s security is under renewed scrutiny following revelations that Israel remains the only known actor to have successfully exploited it. But if history has taught us anything, it’s this: if one nation-state can do it, others may follow. At Appknox, we decided to verify the current state of WhatsApp’s mobile app security for ourselves.

Why Omdia recommends Extended Access Management to simplify compliance

Omdia, a global analyst and advisory leader, recently released a report called “How Extended Access Management (XAM) closes the gaps in security.” This report describes how existing approaches to access management have failed to address the security, budgetary, and compliance risks posed by unmanaged identities, applications, and devices.

ISO 27001 certification: Cost, process, timelines and implementation in 2025

In this article Businesses looking for serious compliance street cred often turn first to ISO 27001. ISO 27001 is a globally recognized framework that outlines and defines information security management system (ISMS) requirements. Because being ISO 27001 certified demonstrates an organization meets best practices for information security, ISO certification can give businesses a significant competitive advantage. If you’re weighing ISO 27001 vs.

5 Ways Regulatory Changes Are Shaping Data Security Strategies

Today's regulations and info edicts aren't just red tape-they're rewriting the rules of how you protect data, especially as you swim through the web. From breach reporting to global privacy laws, keeping up with compliance updates can help you walk through a smarter, faster security game for your personal and professional interests. This is why, if you're handling and managing sensitive info-or just want to avoid fines and fallout-here's how the latest legal shifts are reshaping how you can secure what matters most.

Trustwave DbProtect Expands to Secure Snowflake: Strengthening AI Repository Protection

Trustwave's database protection solution, DbProtect, now supports Snowflake, which is a popular, cloud-based data warehousing platform used by organizations to power AI models and data-driven workflows. Snowflake's cloud-based architecture separates storage and compute functions, allowing organizations to scale each independently. The platform's ability to handle both structured and semi-structured data makes it a preferred choice for a broad range of AI and analytics applications.

How to Achieve DDoS Defense with Real-Time Network Analysis

DDoS Defense with up-to-the-minute network analysis has become crucial as these attacks have disrupted network security for almost 20 years. The landscape changed dramatically in 2018 when the first multi-terabyte per second DDoS attacks crippled major organizations. GitHub experienced a massive 1.3TB/s attack that year, which dwarfed the previous record – a 602GB/s attack on the BBC just two years earlier.