Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Warning: Voice Deepfakes Continue to Improve

AI-generated voice deepfakes present an urgent threat to organizations, according to researchers at Pindrop. The researchers warn that speech generation tools can create realistic-sounding cloned voices in near real-time, allowing attackers to hold live conversations with victims while imitating someone the victim knows. Additionally, these tools can now convincingly imitate human emotions, making social engineering attacks even more persuasive.

Phishing Deep Dive: EU-Affiliated Survey Platform Exploited in Sophisticated Credential Harvesting Campaign

Lead Researchers: James Dyer and Louis Tiley Between May 5 and May 7, 2025, KnowBe4 Threat Lab identified a phishing campaign originating from accounts created on the legitimate service ‘EUSurvey’. Although this was a focused campaign, on a smaller-scale to others identified by the team, it employed a combination of sophisticated techniques worth highlighting.

CVE Trends to Watch: Real-World Risks to Telecom and Professional Services

Cybersecurity weaknesses span both software and hardware systems, creating numerous opportunities for exploitation. Among the most common access vectors leveraged by threat actors are phishing attacks and Common Vulnerabilities and Exposures (CVEs). When left unpatched, CVEs can pose significant risks to an organization’s systems, exposing sensitive data and operational assets to potential compromise.

From Code to Conversations: How Modern AI Creates New Classes of Data Risk

The rise of generative AI has fundamentally changed how we work, create, and collaborate. But as organizations rush to integrate AI tools into their workflows, they're inadvertently creating entirely new categories of data risk that traditional security measures weren't designed to handle.

Tines selected as a launch partner for enhanced version of AWS Security Hub

Today at re:Inforce Amazon Web Services (AWS), unveiled an enhanced version of AWS Security Hub which will enable organizations to surface and prioritize active risks in their cloud environment. Security Hub transforms security signals into actionable insights and offers intuitive visualizations and natural language summaries. Tines will offer workflow orchestration and automation for this enhanced version of Security Hub.

183,000 Companies Were Hit by Cyberattacks on Tech Providers in 2024

Technology plays a vital role in supplier networks and digital ecosystems today. While supply chains used to be primarily physical, digitalization has improved efficiency but also introduced new cybersecurity risks that are often overlooked. As software and digital service providers are often integrated into organizations’ environments, they have become prime targets for cybercriminals looking to scale their attacks.

Cato + AWS: The power of partnership for a secure, connected cloud

In enterprise IT, there’s a familiar story: moving applications to the cloud is easy—but securely connecting cloud workloads isn’t. Cloud migration is no longer a question of if, but how fast enterprises can make the shift. As of 2025, an estimated 67% of enterprise infrastructure runs in the cloud, highlighting the widespread adoption of cloud hosting and infrastructure services worldwide.