Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Ransomware Attack Simulation: Did They Survive? #cybersecurity #ransomware

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Weaving Chaos - Scattered Spider's Cyberattacks Spin a Dangerous Web Across the Insurance Industry

In Q2 2025, Scattered Spider has been noted as a prolific threat actor targeting several sectors across multiple countries. As of June 2025, the group appears to have moved towards targeting the insurance sector. This is not novel victimology within the landscape, with attacks consistently targeting the sector, particularly in the extortion sphere. This blog explores the attacks Scattered Spider has conducted in 2025, as well as similar attacks around the insurance sector in the year.

Top Nine Benefits of Privileged Access Management (PAM)

Privileged Access Management (PAM) enhances your organization’s security, streamlines compliance and improves productivity. After watching this short video, you’ll know several benefits of implementing a modern PAM solution like KeeperPAM in your organization.

Defending the Internet: how Cloudflare blocked a monumental 7.3 Tbps DDoS attack

In mid-May 2025, Cloudflare blocked the largest DDoS attack ever recorded: a staggering 7.3 terabits per second (Tbps). This comes shortly after the publication of our DDoS threat report for 2025 Q1 on April 27, 2025, where we highlighted attacks reaching 6.5 Tbps and 4.8 billion packets per second (pps). The 7.3 Tbps attack is 12% larger than our previous record and 1 Tbps greater than a recent attack reported by cyber security reporter Brian Krebs at KrebsOnSecurity.

Everything you need to know about NIST's new guidance in "SP 1800-35: Implementing a Zero Trust Architecture"

For decades, the United States National Institute of Standards and Technology (NIST) has been guiding industry efforts through the many publications in its Computer Security Resource Center. NIST has played an especially important role in the adoption of Zero Trust architecture, through its series of publications that began with NIST SP 800-207: Zero Trust Architecture, released in 2020.

Leading the Next Evolution of Cybersecurity: From Threat Management to Real-Time Risk

The cybersecurity landscape has reached a turning point. In this article, George Patsis, CEO of Obrela, challenges the traditional, tool-centric approach to cyber defense and goes through Obrela’s ground breaking approach to: real-time risk management. With cyber threats growing more complex and unpredictable, organizations must shift from reactive threat detection to a context-aware, business-aligned risk management.

Maximizing Value in USA to Poland Money Transfers

How do you ensure maximum value when sending money from the USA to Poland? People who frequently send money abroad understand how fees, exchange rates and transfer durations reduce the final amount received. The good news? The right transfer service paired with smart strategy lets you optimize your money transfers to Poland. There are many effective ways to send money to Poland and get more złoty for your dollar.