Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Heightened Threat of Iranian Cyber Attacks: How to Understand the Risk and Enhance Resilience

The physical conflict involving Iran that has played out in the Middle East over the last several days is expected to increasingly spill over into the cyber realm. According to the Department of Homeland Security, the Cybersecurity and Infrastructure Security Agency (CISA), and other cybersecurity experts, organizations in the US should begin preparing for increased cyber attacks from pro-Irianian hacktivists and Iranian government-affiliated actors in the coming days and weeks.

What's New in CyCognito: June 2025 Platform Enhancements

In today’s high-stakes cybersecurity landscape, one truth stands out: if you can’t see it, you can’t secure it. And if you can’t act on what you see, you’re no better off. That’s why we’re focused on delivering continuous improvements that help security teams move faster, see further, and reduce risk where it matters most.

Understanding CRA Compliance: Overcoming Challenges with an Integrated Security Testing Approach

Shipping software into the EU now comes with serious strings attached. The Cyber Resilience Act (CRA), in effect since December 2024, sets strict new rules for any company offering digital products or services in the region, whether you’re a local startup or a global platform. The regulation aims to improve cybersecurity across connected devices and cloud-based software.

Tech Under Siege: Unpacking Cyber Threats in Trustwave's 2025 Risk Report

Threat actors know that technology makes the world go round, and these adversaries are more than willing to use every cyber weapon at their disposal to take advantage of that fact, according to Trustwave SpiderLabs’2025 Trustwave Risk Radar Report: Technology Sector.

The Power of Patents as Netskope "Customer Zero"

As Netskope approaches the 300 patent milestone, I sat down for a quick chat with our CISO James Robinson to hear about the most recent patent granted to his team, find out why he sees patents as being so important, and discover what they tell us about the way his team—the team in charge of cybersecurity at a cybersecurity company—innovates.

Security Team's Secret: How to Make Everyone Love You! #cybersecurity #securityteam

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

A Real Example of Copilot Exposing Sensitive Data

Is Microsoft Copilot putting your sensitive data at risk? AI tools like Copilot can unintentionally expose sensitive information through indirect queries leading to data leaks, insider threats, and compliance risks. In this webinar, we break down real-world examples of how over-permissioned access and prompt manipulation can bypass security controls and what you can do to prevent it. Stay ahead of AI-driven threats.

Europol Warns of Social Engineering Attacks

Social engineering remains a primary initial access vector for cybercriminals, according to a new report from Europol. “Social engineering, which exploits human error to gain access to systems or personal information, stands out as a prominent technique used by criminal actors in this context,” Europol says.

EDR, DFIR and Endpoint Triage with Brian Carrier

Brian Carrier, CEO of Sleuth Kit Labs, joined Defender Fridays to discuss EDR, DFIR and Endpoint Triage. We explored how SOCs can effectively investigate endpoints after alerts to decide whether to wipe it or call an IR team. Brian covered leveraging EDR data and additional forensic artifacts for better Endpoint Triage, helping teams cut through the overwhelming amount of information to make informed response decisions.