Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Third-Party Risk Management: Best Practices and Trends

In the quiet corners of the darknet, threat actors aren’t always looking for a way to break through your front door. Instead, they’re hunting for the “side door”—the niche cloud provider you use for analytics, the marketing firm with access to your customer data, or the logistics partner with a direct line into your ERP. As we move into 2026, Third-Party Risk Management(TPRM) has evolved from a periodic compliance exercise into a high-stakes game of digital chess.

LevelBlue SpiderLabs: Ransomware Attacks Up 17% in 2025

Ransomware attacks increased by 17.2% percent year-over-year in 2025, with the group Qlin dominating the threat landscape, according to data generated by the LevelBlue SpiderLabs team. These attacks focused primarily on the manufacturing and technology sectors, with the US by far being the most targeted nation. 2025 continued the trend of yearly increases; however, over the last few years, the rate of attacks has somewhat slowed.

Zero-day vulnerabilities: what they are and how to respond

Zero-day vulnerabilities often attract attention and concern because of their unpredictability. They are, by definition, weaknesses that are unknown to software vendors and therefore have no official fix at the point of discovery. When discovered and exploited by malicious actors, they allow attackers to bypass controls before organisations even realise there is a problem.

Stop secrets before they leave your laptop (Git hooks + ggshield install)

Let's look at Git hooks, which is where ggshield really starts paying off in day-to-day developer workflow. Git hooks are built-in automation in Git. When certain events happen, like committing or pushing, Git checks for specific files inside the.git/hooks folder. If a hook file exists, Git runs it automatically. For example, if there’s a file named pre-commit, Git will execute it every time you commit.

Authenticate Users in Joomla Using the REST API: A Practical Guide for Developers

Modern Joomla applications are no longer limited to traditional website workflows. Today, Joomla powers mobile apps, headless frontends, third-party integrations, and backend services that rely heavily on REST APIs. In all these cases, secure API authentication becomes a foundational requirement.

Employee Cybersecurity Awareness Training: Why It Matters?

As we approach 2026, cybersecurity threats continue to escalate in complexity and frequency. With organizations increasingly reliant on digital infrastructure, the human element remains the most vulnerable entry point for cyberattacks. Studies show that 95% of data breaches stem from human errors, which can be employees clicking on malicious links, using weak passwords, or mishandling sensitive data.

SecurityScorecard CISO Steve Cobb as Cyber Santa | Cyber Santa's 2026 Predictions

The New Year is upon us and with a new year comes new changes. Cyber Santa is back with his predictions for the coming year and how cyber will evolve in the next 365 days. SecurityScorecard CISO Steve Cobb returns in his jolly red hat and white beard to shake his snow globe and see what's ahead for the cybersecurity industry in 2026 and what you need to know going into the new year. CISO responsibility, data sprawl, and AI governance are the top 3 on the list of emerging priorities.