Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Introducing GitGuardian's Generic Secrets Enricher

GitGuardian is proud to introduce our new Machine Learning-powered Generic Secret Enricher, helping all customers quickly understand the origin and type of discovered generic secrets. The 2025 GitGuardian State of Secret Sprawl report shows that 58% of all detected secrets fall into the generic category.

How to Secure and Make Your Iframe Compliant in 2025

Iframes are a common tool for embedding content on websites. But they can also bring risks if not handled right. In 2025, it is important to secure iframes. This helps protect your site and meet PCI DSS rules for iframes while avoiding security vulnerabilities. This guide will show you how to secure your iframe, make it compliant, and keep your web security for iframes strong. It includes a table of contents to help you navigate the steps. Let’s get started!

Who needs to comply with NIS 2? Scope, requirements, and penalties explained

NIS 2 is a new EU directive that establishes a unified cybersecurity framework for specific organizations within Member States. Compared to the original NIS directive, the scope has been expanded, and compliance is mandatory for in-scope organizations. ‍ The broader scope means that while NIS 2 is EU-specific, some organizations outside the Union may also be subject to its requirements.

Does Cloud Backup Protect Against Ransomware?

As of 2024, 75 active ransomware groups targeted healthcare industries, businesses, and individuals with the aim of threatening these individuals with data loss or leaks in return for large payouts to decrypt this data. Many security organizations and cybersecurity experts are fighting to prevent ransomware from becoming common. One question on the minds of many people related to this topic is: Does cloud backup protect against ransomware?

Why SASE Makes Zero Trust Work

Gartner predicted that by early this year, over 60% of organizations would be using zero trust as their starting point for security. And no wonder. Cloud migration, hybrid work, and persistent threats have turned security into a minefield, exposing the cracks in old castle and moat, perimeter-based security architectures. Zero Trust aligns with how and where we work today, shifting the perimeter to individual users, devices, and applications—wherever they are.

What is Server Side Request Forgery (SSRF)? Types, Impact, Mitigation, Prevention

In the past few years, the risk of cyberattacks has grown enormously. In fact, more than 800,000 people experience data security breaches every year, which is quite concerning. Looking at these numbers, the safekeeping of web applications has become vital. Now, one significant threat to any web application is server-side request forgery or SSRF. This cyberattack helps the hacker trick the server to reveal sensitive information or access internal systems.

What is Cross Site Request Forgery (CSRF)? Example, Mitigation and Prevention

According to the Open Web Application Security Project (OWASP), CSRF vulnerabilities are among the top 10 most critical web application security risks. This blog will explain everything about CSRF attacks and the prevention methods to help you secure your website. Let’s start by understanding what Cross-Site Request Forgery is.

An Update on QuickShell: Sharing Is Caring about an RCE Attack Chain on Quick Share

Authors: Or Yair, Security Research Team Lead Last August, I shared a blog on my most recent research project with Shmuel Cohen called QuickShell: Sharing Is Caring about an RCE Attack Chain on Quick Share, which we initially presented at DEF CON 32 (2024). In it, we explained how we discovered 10 unique vulnerabilities in Google’s Quick Share data transfer utility, some of which we were able to assemble into an innovative remote code execution (RCE) attack chain against the Windows version.