Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Inside Black Basta: Uncovering the Secrets of a Ransomware Powerhouse

In February 2025, the cybersecurity community witnessed an unprecedented leak that exposed the internal operations of Black Basta, a prolific ransomware group. Trustwave SpiderLabs has taken an in-depth look at the leaked contents, which spell out in detail how the group thinks and operates, revealing discussions on tactics and the effectiveness of various attack tools. Even going so far as to debate the ethical and legal implications of targeting Ascension Health.

Risk-Based Vulnerability Management in IT: Reducing Exploitability Through Automated Prioritization

Organizations face a monumental challenge managing cyber risk and vulnerabilities across expanding digital environments. Research indicates that security teams can remediate merely 10% of detected vulnerabilities due to resource limitations, emphasizing the urgent need for optimized prioritization methods. Risk-based vulnerability management (RBVM) addresses this challenge by focusing remediation efforts on vulnerabilities posing genuine risk to specific organizational assets and infrastructure.

Unlock Total API Visibility and Control, Cost-Effectively

In the current economic environment, IT and security leaders face significant challenges. Budget optimization and prioritizing initiatives that provide real business value are crucial, particularly amidst a growingly complex and threatening threat landscape. This pressure is especially pronounced when it comes to securing the APIs essential for modern applications and linking vital data.

Why Strong Passwords are Still the Best Defence Against Cyber Threats

After covering the importance of unique usernames in yesterday's blog, we would be remiss not to take a look at the second half of most login credentials: passwords. These are important because, despite increasingly sophisticated cybersecurity technologies and methodologies, 86% of breaches still involve stolen credentials.

Random but Memorable - Episode 14.6: Security Agents Protecting Adolescence with Chris McCarty

This episode we meet Chris McCarty, the inspirational student and founder of Quit Clicking Kids, an organization advocating for children's rights in the digital age. Learn about the rise of “sharenting” and how Chris is fighting for legislative changes to safeguard minors from exploitation on social media platforms. We cover everything from the permanence of online content to getting Gen Z proactive about their privacy.

Access Requests, Approvals & Provisioning - All in Jira | Workflow for Jira by miniOrange

Streamline Access Requests & Provisioning with Workflow for Jira by miniOrange | Product Demo Tired of messy spreadsheets, email approvals, and manual provisioning? Say hello to Workflow for Jira by miniOrange — your all-in-one solution to automate Application Access & Governance directly within Jira Service Management.

Top 5 Tech Trends Shaping Financial Services in 2025

New technologies, regulatory shifts, and the next generation of clients are redefining the financial services industry and what customers expect from the firms they work with. Firms embracing these changes will gain a competitive edge, while those who ignore them risk falling behind. Countless technology innovations across the industry are redefining the customer experience, security, data management, and back-office functions. But what is poised to make the biggest impact in 2025?