Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Report: There Are Nearly 66 Billion Stolen Identity Records on Criminal Forums

Researchers at SpyCloud warn that the number of stolen identity records on criminal forums rose to 65.7 billion in 2025, a 23% increase from the previous year. “Phishing, malware, third-party breaches, and combo lists feed vast volumes of identity data into the industrialized criminal ecosystem,” the researchers write. “The risk extends beyond compromise – it fuels costly attacks at scale.

Criminals Are Selling Stolen Tax Forms for Cheap on the Dark Web

Researchers at Malwarebytes warn that cybercriminals are peddling stolen tax documents for as low as $4 per identity, with freshly stolen forms selling for $20 each. These documents allow threat actors to conduct refund fraud, using stolen personal information to claim victims’ tax refunds.

Claude Code Auto Mode: What It Means for AI Agent Privilege Management

Anthropic’s new Claude Code Auto Mode Auto Mode is generating well-deserved attention. It introduces a classifier that sits between the developer and every tool call, reviewing each action for potentially destructive behavior before it executes. It’s a real improvement over the only previous alternative to manual approval: the –dangerously-skip-permissions flag. But the announcement is also useful for a broader reason.

INETCO wins 2026 fraud detection and cybersecurity software award

INETCO has been named Best Online Fraud Detection & Cyber Security Software 2026 by Corporate Vision in the Canadian Business Awards. This recognition highlights the real world impact our customers are making to prevent payment fraud and strengthen cyber resiliency across global payment ecosystems.

Ransomware Protection Best Practices: Leveraging MDR and EDR in the Zero Trust Era

Ransomware attacks are on the rise. Their quiet nature is one of the main reasons why many organizations are unable to detect them. Ransomware attacks begin with something small, maybe a login at an unusual hour or a script running where it normally should not. There could be many more instances, which may not appear suspicious at first. By the time encryption begins, attackers have already moved deep into the environment.

World Backup Day: Don't Jump Without a Parachute

You would never jump out of an airplane with only a single parachute. If that main canopy fails, you need a reserve ready to deploy immediately. Yet, countless organizations operate their IT infrastructure every day without a reliable safety net for their most critical asset. They plunge into the digital landscape assuming their primary data storage will never fail. March 31 is World Backup Day, which serves as a crucial reminder to pack your digital parachute.

Emerging Threat: F5 BIG-IP Access Policy Manager Remote Code Execution (CVE-2025-53521)

CVE-2025-53521 is an unauthenticated remote code execution vulnerability in F5's BIG-IP Access Policy Manager (APM). The flaw exists in the apmd process, the daemon responsible for processing live access policy traffic, and is triggered when a BIG-IP APM access policy is configured on a virtual server and the system receives specific malicious traffic. No credentials are required to exploit it. The vulnerability carries a CVSS score of 9.8 and a CVSS score of 9.3.

Configuring ESXi VM Networks

In the previous posts, we took a look at setting up VMkernel networks, including storage and vMotion. Now, we discuss configuring ESXi networks for the VMs themselves. VM networks provide connectivity of the VMs to the production network. Let’s walk through how these are configured. NAKIVO for VMware vSphere Backup Complete data protection for VMware vSphere VMs and instant recovery options. Secure backup targets onsite, offsite and in the cloud. Anti-ransomware features. DISCOVER SOLUTION.

What RSAC 2026 Told Me About the Future of Cybersecurity

RSAC remains the cybersecurity event. It is where the industry gathers to compare notes, pressure-test assumptions, spot the next wave of market change and, just as importantly, build the partnerships that will shape what comes next. This year in San Francisco, that energy was unmistakable. There was real buzz across the city, from the show floor and executive meetings to the side events and industry gatherings that increasingly define RSAC week.

Let's Encrypt simulated revoking 3 million certificates. Most ACME clients didn't notice.

On March 19th, Richard Hicks, one of our customers, emailed us about a certificate that had renewed after only a week. It was a 90-day certificate and he had not initiated the renewal. That’s the kind of thing that sends you straight to the logs. We found the answer right away. The certificate’s ARI renewal window had been shortened dramatically.