Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

When cyberthreats meet the farm: Protecting OT in food and agriculture

The systems that grow, process and deliver our food operate in a world most of us never see: legacy equipment, air-gapped networks and decades-old operating systems quietly controlling the machinery that keeps supply chains moving. What happens when modern cyber threats collide with this aging infrastructure? The answer is more urgent than most people realize.

Response to "Principles for the Secure Integration of Artificial Intelligence in OT"

This new guidance amounts to leading Western governments telling OT users (industrial businesses in manufacturing, energy, power, logistics, critical infrastructure, and the like), “Yes, you can use AI in OT, but only if you’re prepared for it to fail and you can recover quickly when it does.”

Social Engineering Campaign Targets Microsoft Teams Users

Researchers at CyberProof warn that threat actors are launching phishing attacks via Microsoft Teams' “Chat with Anyone” feature, which lets external users send direct messages via email addresses. “Microsoft Teams now allows users to send direct chat invitations to any email address, even if recipients aren’t part of a Teams tenant,” the researchers explain.

Malware Analysis - 2025 MITRE ATT&CK Enterprise Evaluations

The 2025 MITRE ATT&CK Enterprise Evaluations challenged defenders with sophisticated malware analysis scenarios, and CrowdStrike delivered 100% detection and protection with zero false positives. Traditional malware analysis takes hours or days, but modern threats like Mustang Panda require instant answers: What does this file do? What family does it belong to?

What's New With Keeper | December 2025

The latest updates to KeeperAI threat detection introduce meaningful updates across PAM resources, PAM configuration settings, gateway settings and session history, providing an enhanced security layer within the web vault architecture. KeeperAI automatically monitors and analyzes SSH sessions in real-time to identify suspicious or malicious activity, ensuring that high-risk sessions are automatically terminated and all user activity is analyzed and categorized.

CVE-2025-66516: Critical XXE Vulnerability Exposes Apache Tika Deployments

A critical XXE vulnerability, CVE-2025-66516, has been discovered in Apache Tika, putting any workflow that processes PDFs at serious risk. A malicious PDF can trigger the exploit through any Tika workflow, silently giving attackers access to sensitive files, internal URLs, cloud metadata, and your internal network. AppTrana blocks these malicious PDFs at the edge, keeping your data and internal systems secure.

How Insurity Cut Manual Security Work by 81%

95 hours back. Every. Single. Month. One of the many outcomes from our ZTA journey with Insurity. They didn’t just deploy Zero Trust — they operationalized it. Reach unified controls, automated remediation, and eliminated the manual effort slowing progress. Results:︎ 81% less manual work︎ 95 hours saved per employee per month︎ Months → days for rollout︎ Zero Trust that sticks.