Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Credit Card Cloning: What Is It , How It Works, and How to Protect Yourself

Discover a charge on your credit card that you don’t recognize. It could be from a card cloning event. Card cloning predominantly affects credit cards, but this phenomenon may also impact some payment platform cards (like those from PayPal or Zelle). In short, card cloning occurs when the card’s magnetic strip or chip is used in unauthorized transactions. Credit card cloning is a form of fraud, but it differs from others in its more nuanced elements.

CVE-2025-29927 - Authorization Bypass Vulnerability in Next.js: All You Need to Know

On March 21st, 2025, the Next.js maintainers announced a new authorization bypass vulnerability – CVE-2025-29927. This vulnerability can be easily exploited to achieve authorization bypass. In some cases – exploitation of the vulnerability can also lead to cache poisoning and denial of service.

WatchGuard Wins CRN 5-Star for 9th Year, Dominating MSP Security

At WatchGuard, we proudly announce that our WatchGuardONE partner program has received the prestigious 5-star rating from CRN, a brand of The Channel Company, in the 2025 CRN Partner Program Guide. This marks the ninth consecutive year WatchGuard has earned this recognition, solidifying the commitment to providing the industry’s most powerful, profitable, and MSP-friendly security solutions.

Security Week 2025: in review

Thank you for following along with another Security Week at Cloudflare. We’re extremely proud of the work our team does to make the Internet safer and to help meet the challenge of emerging threats. As our CISO Grant Bourzikas outlined in his kickoff post this week, security teams are facing a landscape of rapidly increasing complexity introduced by vendor sprawl, an “AI Boom”, and an ever-growing surface area to protect.

Cross-Border Data Compliance: Navigating Public Security Regulations in a Connected World

It is a significant benefit that the world is connected the way it is, with the potential for even greater interconnectivity. However, this has come at huge costs, too, considering the rise in the direct involvement of state actors engaged in cyber warfare. Against this background, nations have a more acute awareness of digital vulnerabilities, which has radiated into regulatory frameworks concerning cross-border data compliance.

How we standardized error handling at Vanta

‍ I love working in monolithic repositories. It fosters collaboration, code reuse, and knowledge sharing—some of my favorite aspects of engineering culture here. ‍ However, without guardrails, complexity can grow unchecked, making it harder to reason about the system as a whole. In early 2024, it was clear that our error handling strategies had fallen victim to this, and it was impacting the quality of our product.

Cyber Shields Up: Defending Your Data & Identities with Data Security Posture Management

In today’s evolving threat landscape, protecting your data and identities is more critical than ever. In this snippet from an expert-led session, Netwrix specialists Adam Laub and Jeff Warren explore how Data Security Posture Management (DSPM) and a layered defense strategy can strengthen your cybersecurity approach. You’ll learn how to: Whether you're focused on compliance, identity protection, or data exposure mitigation, this webinar offers actionable insights and practical use cases to help you build a more resilient security framework.

The Howler - Episode 17: Kerri Shafer Page, Vice President of Incident Response

This month, we sit down with Kerri Shafer-Page, Vice President of Incident Response, as she shares a peak behind the curtain of the day-to-day of her and her team, reflections on being a woman in tech, and so much more! Kerri Shafer-Page serves as the Vice President of Digital Forensics and Incident Response at Arctic Wolf. A proven leader in threat identification, IT security and data privacy incident response and mitigation, Kerri has served in leadership roles at IBM and AIG, overseeing incident response and cybersecurity claims.