Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

New Ransomware Groups Emerging in Late May 2025: A Threat Intelligence Overview

As of the end of May 2025, seven new ransomware groups have surfaced with active leak sites and confirmed victim postings. These groups—Silent Ransomware, Gunra Ransomware, JGroup Ransomware, IMN Crew, DireWolf Ransomware, DataCarry Ransomware, and SatanLock Ransomware have demonstrated early signs of active targeting and data exfiltration campaigns. This blog provides a detailed breakdown of their activity, initial victimology, and attribution by geography where applicable.

The Future of Developer Upskilling Is Human-Led, AI-Supported

In the last year, generative AI has dramatically accelerated how software is written. Developers can generate entire functions with a prompt, automate repetitive logic, and offload everything from boilerplate code to documentation. But with this newfound speed comes a deeper, more complex challenge: ensuring that what’s being created is secure, trustworthy, and production-ready.

COPPA Compliance: Top 5 Website Security Tips for Kids

In the digital era, safeguarding children’s online privacy is paramount. The Children’s Online Privacy Protection Act (COPPA) establishes stringent guidelines for websites and online services targeting users under 13 years of age. Non-compliance can lead to significant legal repercussions and erosion of user trust. This article delves into comprehensive website security strategies to ensure COPPA compliance and protect children’s online privacy.

New Spotlight Report on Healthcare Identifies the Need for a Culture of Cybersecurity

Cybersecurity is a business requirement. Taking a holistic view of cybersecurity as part of the business means that risk, budget, and innovation can achieve balance. In a global survey of 220 healthcare organizations the prevailing wisdom shows that 43% effectively align business risk appetite with cybersecurity risk management, 43% allocate cybersecurity budget to every project from the beginning, and 55% believe they can risk more with innovation because they take an adaptive approach to cybersecurity.

CrowdStrike Named a Customers' Choice in 2025 Gartner Peer Insights Voice of the Customer for User Authentication Report

CrowdStrike has been named a Customers’ Choice in the 2025 Gartner Peer Insights “Voice of the Customer for User Authentication” report. We have the most five-star ratings of any vendor evaluated in the report and a 97% Willingness to Recommend rating, based on 206 overall responses as of February 28, 2025.

CIO POV: Closing the trust gap in SaaS security

“The modern ‘software as a service’ (SaaS) delivery model is quietly enabling cyber attackers and—as its adoption grows—is creating a substantial vulnerability that is weakening the global economic system.” These are the words of JPMorgan Chase CISO Patrick Opet in an open letter to third-party suppliers that has gone viral, at least in the cybersecurity world, and sparked a broader conversation about building trust in cyberspace.

The Growing Threat: Cybersecurity Challenges for SMBs in 2025

Hackers no longer target only the large players. In fact, cyberattacks on small to medium-sized businesses (SMBs) are becoming increasingly prevalent, with greater accuracy, frequency, and impact. Whether you operate an e-boutique or an offshore-first marketing firm, cyber threats are pounding at your virtual door-and they're not knocking, they're demanding entry. So, what's new? And why are SMBs now such tempting targets? Let's get to the bottom of it.