Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Agent hijacking: The true impact of prompt injection attacks

Over the last 18 months, you’ve probably heard about Large Language Models (LLMs) like OpenAI’s GPT and Google’s Gemini. Whether you’re using them as a personal research assistant, an editor, or a data analyst, these tools represent a new frontier of Machine Learning (ML) and Artificial Intelligence (AI) and arguably will have the most significant impact of any technology in this decade.

Reimagining Supply Chain Cybersecurity

From ransomware attacks to data breaches, the threats lurking within supply chains are more pervasive than you might realize. Many security teams aren’t aware of the various supply chain cyber risks lurking within their network, most of which are difficult to detect, manage, and mitigate. Let’s explore how to achieve a more secure and resilient supply chain.

What Happens if You Call Back a Spam Number?

If you answer a spam call, you might start receiving more spam and scam calls, become a victim of SIM card swapping or get your phone number spoofed. Based on Truecaller’s findings, from July 2023 to July 2024, Americans collectively spent approximately 234,000,000 hours answering spam calls. While not every spam call is intended to deceive you like a scam call, receiving unwanted phone calls from persistent telemarketers can quickly become annoying.

Types of Spyware

There are several different types of spyware, such as adware, stalkerware and keyloggers. No matter what kind of spyware is installed on your device, it is frightening to have your privacy invaded and sensitive information stolen by cybercriminals. Read more to learn what spyware is, the different types of spyware and how to protect your devices from spyware.

Three Misconceptions About Dealing with a Global IT Outage

The events of Friday the 19th 2024 had a profound impact on organizations around the globe. I suppose a widespread global IT outage has a way of clarifying the mind—and IT leaders are recognizing that resilience is crucial for maintaining operations for their consumers, customers, staff, partners, and shareholders. But much of the post-mortem analysis seems to be misunderstanding key lessons from the outage.

Mastering API Compliance in a Regulated World

As we continue our Summer School blog series, let's focus on a vital aspect of modern application security: the relationship between API posture governance, API security, and the constantly changing regulatory compliance landscape. In today's interconnected world, where APIs are crucial for digital interactions, organizations are challenged with securing their APIs while complying with complex regulations designed to protect sensitive data and critical infrastructure.