Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The 8 Types of Penetration Testing: When You Need Them and How Often to Test

Penetration testing (aka pentesting or ethical hacking) might sound intense—and honestly, it is—but think of it as your digital stress test. Ethical hackers mimic real cyberattacks on your systems to find weak spots before the bad guys do. The coolest part? Pen tests come in different flavors, each targeting specific risks. So, how do you know when it’s time for a pentest? How often should you schedule them? And which one is right for your business?

Why Cyber Insurance Is Vital To Keeping Businesses Standing When Threats Hit

Steve Hunter, Director of Sales Engineering at Arctic Wolf, discusses the importance of cyber insurance for organizations in mitigating cyber risks. He explains the types of coverage cyber insurance policies offer, the growing challenges in obtaining coverage, and the essential strategies for evaluating a policy. Steve also highlights the need for organizations to enhance their cybersecurity measures and how they can communicate effectively with insurers to improve their risk profile.

Cyber Risk Heats Up: 2025 Predictions for Australia

Mark Thomas, Director of Security Services for ANZ at Arctic Wolf, unravels the upcoming cyber security landscape in 2025. He outlines heightened risks due to geopolitical tensions and zero-day cyber attacks, the need for better protection of critical infrastructure, the impact of technology investment, and the importance of viewing cyber risk as business risk.

Lumma Stealer: Fake CAPTCHAs & New Techniques to Evade Detection

In January, Netskope Threat Labs observed a new malware campaign using fake CAPTCHAs to deliver Lumma Stealer. Lumma is a malware that works in the malware-as-a-service (MaaS) model and has existed since at least 2022. The campaign is global, with Netskope Threat Labs tracking victims targeted in Argentina, Colombia, the United States, the Philippines, and other countries around the world.

The Evolution of SSE and Its Role in Modern Security Architectures

The cybersecurity landscape has shifted dramatically over the last several years. More and more work takes place outside of the office and in the cloud — in fact, experts expect the cloud market to exceed $676 billion in 2024. It’s not hard to see why. With the cloud, organizations gain unprecedented freedom to work how they want, whether that’s in-office, in one or more cloud environments, or in a hybrid of multiple approaches.

Trust Center: A Comprehensive Guide for Organizations

Most enterprise security teams spend hundreds of hours annually filling security questionnaires and sharing compliance documents with customers. A trust center cuts this down to near zero by putting everything in one place. The concept isn’t new – organizations have long maintained security documentation. However, recent data breaches, stricter regulations, and cloud adoption have transformed an essential requirement into a business driver.

Inside FunkSec: An Exclusive Interview with a Ransomware Architect

Summary FunkSec is a new ransomware group that came into the spotlight after attacking many sectors around the world. The group runs a data leak site on Tor. Funksec employees conduct double extortion attacks, which means hackers encrypt and exfiltrate data from the victim to extort them for paying ransom to the attackers.

Memcyco Unveils Its Next-gen Phishing and Digital Impersonation Protection Solution

In 2024’s State of Digital Impersonation Resilience report there was one key finding that neatly frames the digital impersonation fraud challenge. Of the businesses surveyed, 72% use a digital impersonation protection solution, but only 6% could confirm its efficacy. In other words, scam-targeted industries are investing in finding solutions, but those solutions aren’t delivering.

Sending billions of daily requests without breaking things with our rate limiter

At Detectify, we help customers secure their attack surface. To effectively and comprehensively test their assets, we must send a very high volume of requests to their systems, which brings the potential risk of overloading their servers. Naturally, we addressed this challenge to ensure our testing delivers maximum value to our customers while being conducted safely with our rate limiter.