Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Run a Domain Spoofing Check (and Stop Fake Sites Before They Hurt You)

Imagine this: a customer clicks a paid search ad that looks exactly like your brand—same logo, same layout, even your brand tone. They enter their login credentials, maybe their payment details… and they’ve just handed everything over to a scammer. This is domain spoofing in 2025. And it’s scaling faster than most businesses are prepared for.

The Cybersecurity Investment Most Organizations Are Failing to Secure

Welcome to the 2025 Identity Security Landscape rollout—and to the “it’s complicated” phase of our relationship with AI. Each year, CyberArk surveys security leaders across the globe to understand their top identity security concerns. This year, AI delivered the trifecta: attack weapon, defense tool and risk multiplier.

Patching is Risky Business: By the Gartner Numbers

When I read Eyal’s blog, Why FWaaS is the Only Way Out of Endless Appliance Patching, I imagined a time in the immediate now (oxymoron intended); a time where the word “patching” is as quaint as rotary phones. In my mind, I was Marty McFly, jumping out of the DeLorean, shocked to discover that in the year 2025, we’re still patching appliance boxes. But here’s the kicker: everything has changed. Except the way we think about patching.

Exploited! Erlang/OTP SSH Unauthenticated Remote Code Execution Vulnerability (CVE-2025-32433)

Erlang/OTP ships with an SSH daemon that many telecom, IoT, Elixir/Phoenix, RabbitMQ and CouchDB deployments leave running for convenience. A flaw in how that daemon parses pre-authentication SSH protocol messages enables an attacker to break out of the key-exchange state machine and open an arbitrary channel before credentials are verified.

Protecting Public Sector Websites and the critical systems behind them: link to the hosted On-Demand

Your agency’s website is more than just a landing page—it’s where constituents find information, apply for services, and engage with their government. It’s your digital front door. But security doesn’t stop at the homepage. Behind every online form, data portal, and public-facing interface, there’s a complex infrastructure that needs just as much protection.

5 Elements for a Robust Security Strategy GovLoop and Anish Patel

Agencies are tasked with protecting their networks from cyberattacks, but there is no longer a perimeter that makes it easier to defend. Instead agencies need to rethink how they secure every device connecting to an agency network. Considering the number of connected devices — hundreds of thousands — it's best to ensure sound security. Specifically, you’ll learn.

Why Partial DLP Coverage Leaves Your Data Exposed - And How to Fix It

At first, hearing this common refrain from security leaders comes as a shock. But if you know about the limitations of legacy data loss prevention (DLP) solutions, this statement makes perfect sense. Legacy DLP can leave security teams with the assumption that they have full control over their data risk profile and vectors. In reality, blind spots can occur in any security configuration.