Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

OpenAI Report Describes AI-Assisted Social Engineering Attacks

OpenAI has published a report looking at AI-enabled malicious activity, noting that threat actors are increasingly using AI tools to assist in social engineering attacks and influence operations. In one case, the company banned ChatGPT accounts that were likely being used in North Korean attempts to fraudulently obtain jobs at US companies. “Similar to the threat actors we disrupted and wrote about in February, the latest campaigns attempted to use AI at each step of the employment process.

Keeper Security Named Overall Leader in 2025 GigaOm Radar Report for Enterprise Password Management

GigaOm, a renowned technology analyst firm, has recognized Keeper Security as the Overall Leader in Enterprise Password Management for the fourth year in a row. The GigaOm 2025 Radar Report for Enterprise Password Management highlights Keeper’s Privileged Access Management (PAM) solution, KeeperPAM, which helps organizations secure passwords, credentials, secrets and connections to mitigate cyber risks and defend against internal and external threats.

What To Know About the UNFI Cyber Attack

On June 9, 2025, United Natural Foods, Inc. (UNFI) – a major organic food distributor and the main grocery supplier for Whole Foods Market – reported a cyber attack. UNFI first discovered unauthorized activity in its IT systems on June 5 and immediately took some systems offline. At the time of this writing, the investigation is ongoing as officials assess the full impact of the breach.

What does 'software reachability granularity' really mean 2nd Episode

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Elevating Cyber GRC With a Smarter Risk Register Strategy

‍Cybersecurity governance, risk, and compliance (GRC) programs are gaining institutional support, with 61% of respondents from Sprinto's "Pulse of Cyber GRC Report 2025" claiming that embedding GRC into their business strategy is one of their organization's top priorities. Even so, only 53% state that they are doing so effectively, highlighting the prevalent gap that exists in the cybersecurity world between intention and execution.

Inside the Botnet Economy: Building, Selling, and Using Compromised Devices for Cyberfraud at Scale

Botnets have become a core part of the infrastructure in today’s cybercrime ecosystem — not just as enablers of disruption, but as purpose-built networks engineered for profit, stealth, and scalability. Built from large networks of compromised devices and rented out via criminal marketplaces, botnets are now essential as-a-service components of any cyberfraudster’s toolkit. While the concept of a botnet is not new, their construction, use cases, and value have certainly advanced.

Open Chroma Databases: A New Attack Surface for AI Apps

Chroma is an open-source vector store–a database designed to allow LLM chatbots to search for relevant information when answering a user’s question–and one of many technologies that have seen adoption grow with the recent AI boom. Like many databases, Chroma can be configured by end users to lack authentication and authorization mechanisms.

Service Account Security: 5 Essential Rules Every Organization Must Follow

While organizations pay close attention to securing regular human accounts, service accounts often lack proper oversight. Yet their high level of access makes them a prime target for attackers seeking entry points into an organization’s network. In this article, we examine the core reasons service accounts may undermine organizational cybersecurity and outline five essential rules to help you secure your service accounts.