Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Brivo Access: How to Add Cards

A card is a type of access control credential that provides a secure and auditable method for verifying a user's authorization to enter restricted spaces. This how-to video will provide the steps needed to add or remove cards from your Brivo Access account. Explore the future of security and smart technology with Brivo. Our content delves into innovative solutions that empower businesses and individuals to create safer, more connected environments.

April 07, 2025 Cyber Threat Intelligence Briefing

This week’s briefing covers: North Korean Fake Workers Expand to European Organizations Kroll has previously reported on the growing scale of the DPRK IT worker fraud scheme where the U.S. was a key focus, with some Southeast Asian countries also seeing fraudulent activity. It has since been reported that an increase in active operations in Europe has been observed—a notable expansion since its beginnings in 2024.

The Fastest Way to Secure Your APIs? We've Got That Covered with CrowdStrike

APIs are the backbone of modern apps, but they also introduce some serious security risks. Attackers are constantly on the lookout for vulnerable APIs, shadow APIs, zombie APIs, and exposed sensitive data—all of which are tough to track if you don’t have the right tools in place. That’s why we’ve teamed up with CrowdStrike to make API security easier, faster, and more powerful than ever.

Upgraded Phishing-as-a-Service Platform Drives a Wave of Smishing Attacks

A phishing-as-a-service (PhaaS) platform dubbed ‘Lucid’ is driving a surge in SMS phishing (smishing) attacks, according to researchers at Prodaft. The platform is operated by Chinese cybercriminals who offer access to the service under a subscription model. A Lucid subscription allows crooks to easily craft sophisticated, targeted phishing campaigns.

Online Gaming Platform Steam Tops List of Most Imitated Brands For the First Time

Steam was the most impersonated brand in phishing attacks during the first quarter of 2025, according to a new report from Guardio. The researchers note that the gaming platform’s surge to the top comes as “a bit of a shock.” “Historically, the spot has been dominated by the usual suspects - big tech companies like Meta, Microsoft, or even USPS,” Guardio says. “But this quarter, it’s Steam, and by a significant margin.

10 Best IoT Security Companies in 2025 [Expert Opinion]

Security vendors love dashboards with polished interfaces, graphs, alerts, and AI-powered insights. But as a CTO, you don’t need another dashboard; you need security that works when it matters. When an attack slips through, the UI won’t save you—only real-time detection, automated defenses, and a team that responds before you even call will. The best IOT security companies don’t just sell tools; they embed security into the fabric of your infrastructure.

AI in IAM: Automate the monotonous tasks, not the vital ones

Lately, the common theme in emerging identity security technology is AI. It’s all anyone wants to talk about. All of us in the IAM business have been scurrying to find a way to tell our customers and the market that, yes! We have AI! We've had it all along! If that were so obviously true, why isn’t it more broadly known? As an identity security technologist, I’ve experienced the growing pains of AI in IAM. I recently read an interesting essay by a science fiction author.

Github Actions Supply Chain Attacks - Episode 324 - The 443 Podcast

This week on, Corey and Marc discuss a recent cascading supply chain attack involving multiple Github actions workflows that nearly succeeded in compromising a popular Coinbase application. Before that, they discuss a novel way to download malware onto an endpoint by abusing a web browser's caching feature. Additionally, they cover an FBI alert on file converter malware scams.

Lucid, the Phishing-as-a-Service Platform - The 443 Podcast - Episode 325

This week on the podcast, we discuss a recent threat intelligence report on the Chinese Phishing-as-a-Service platform Lucid. Before that, we cover the alleged Oracle Cloud breach before reviewing the Singapore Shared Responsibility Framework, designed to combat financial scams.

Cyber Threat Intelligence to Counter Activist Campaigners

A new activist group is targeting insurance companies. Boycott Bloody Insurance (BBI) aims to raise awareness of the insurance industry’s role in perceived global injustices. Escalatory tactics that disrupt insurers’ day-to-day operations are possible. This may include physical threats against premises and individuals and/or logical threats, such negative social media or cyberattacks.