Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Beyond Block: Rethinking AI Crawler Policies

Why blocking should always be the final step, not the first instinct Artificial intelligence has changed the way people discover information online. Instead of scrolling through ten blue links, millions now ask chat assistants for instant answers. Those assistants rely on automated software known as AI crawlers. These crawlers visit public websites, collect text, code, and metadata, and then feed that material into large language models.

Before the Breach: Why You Need an IR Retainer Like a Golfer Needs a Caddie

An incident response retainer isn’t just a contract, it’s a relationship. It sets expectations, defines access methods, outlines pricing, and ensures your team and your IR partner are already speaking the same language.

CVE-2025-47812: Wing FTP Server Remote Code Execution Vulnerability Exploited in the Wild

On July 10, 2025, a technical article was published by Huntress revealing that a maximum severity remote code execution vulnerability in Wing FTP Server, CVE-2025-47812, had been actively exploited by threat actors as early as July 1, 2025. Details of the vulnerability had originally been published on June 30, 2025, providing a comprehensive breakdown of the flaw and how to exploit it.

CVE-2025-25257: Critical Unauthenticated SQL Injection Vulnerability in FortiWeb

On July 8, 2025, Fortinet released fixes for a critical vulnerability in FortiWeb that could allow an unauthenticated threat actor to execute SQL commands via crafted HTTP or HTTPS requests, tracked as CVE-2025-25257. The flaw lies in the Graphical User Interface (GUI) component and stems from improper neutralization of special elements used in SQL statements. The vulnerability was discovered by a security researcher and responsibly disclosed to Fortinet.

3 Considerations for Navigating Australian IRAP Assessments

Aligning with the Australian Government’s expectations for cybersecurity can present challenges, especially for organizations unfamiliar with the frameworks in use. For those looking to work with or support government programs, understanding how systems are assessed against the Information Security Manual (ISM) is critical. The ISM, maintained by the Australian Signals Directorate (ASD), sets out cybersecurity principles to guide the protection of government information and systems.

Choosing a DDoS Mitigation Strategy: How NDR Helps Identify and Contain DDoS Attempts

In today’s digital battlefield, distributed denial-of-service (DDoS) attacks remain one of the most disruptive tactics used by threat actors. These attacks are not just about overwhelming servers they’re about business downtime, customer dissatisfaction, and reputation loss. With the increasing complexity of attack vectors, traditional DDoS mitigation strategies are no longer enough. Enterprises must adopt smarter, faster, and more adaptive ways to detect and mitigate DDoS attacks.

Alert: Scattered Spider is Targeting the Aviation Sector

The US FBI and cybersecurity experts are warning that the Scattered Spider extortion gang has shifted its focus to the aviation and transportation sectors, BleepingComputer reports. The group spent the past several months targeting companies in the retail and insurance sectors, and has now hit several airlines. Scattered Spider uses social engineering attacks to gain initial access, then steals data and/or deploys ransomware to extort their victims.

AI Attacks Are Coming in a Big Way Now!

AI is going to allow better, faster, and more pervasive attacks. For a few years, if you attended one of my presentations involving AI, I would tell you all about AI and AI threats…perhaps even scare you a bit…and then tell you this, “AI attacks are coming, but how you are likely to be attacked this year doesn’t involve AI. It will be the same old attacks that have worked for decades.” I always got lots of comforted smiles from those ending lines. But this year is different.

Ten new and updated apps for securing and monitoring your environments

Whether you rely on Sumo Logic for securing your systems, monitoring your infrastructure, or maximizing application performance, connecting to your tech stack is essential. That’s why we continuously release new apps and upgrade existing ones, ensuring you can easily connect to your stack and visualize key data with out-of-the-box dashboards. Let’s dive into some of the latest additions to our app catalog, designed to help you monitor, secure, and optimize your environment.

A 7-step Essential Eight compliance checklist

Implementing Essential Eight (E8) is mandatory for in-scope organisations, such as government agencies, critical infrastructure providers, and other non-corporate Commonwealth entities (NCEs). ‍ Even if your organisation isn’t scoped by the framework, aligning with E8 is recommended because it outlines the baseline requirements for defending against cyber threats.