Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Phishing is the Top Security Threat For Smartphone Users

Phishing attacks are the most common security issue for smartphone users, according to a new study by Omdia. The survey found that nearly a quarter (24%) of respondents have fallen victim to a mobile phishing attack. The second most common mobile threat was malware, which is usually delivered via social engineering. The researchers note that phishing attacks reached all the smartphones assessed in the study, regardless of vendor.

Improving AWS security services with Sysdig Secure

One of the primary goals of information security is to protect data, which of course entails protecting the resources that store and provide access to that data. According to the NIST Cybersecurity Framework, organizations need to develop and implement the necessary protections to restrict or mitigate the effect of a possible cybersecurity incident. Security should be integrated right from the source of the cloud architecture design process.

AI: The Cybersecurity Revolution or Apocalypse? Interview with Steve Wilson at DAVOS 2025

AI is reshaping both innovation and cybercrime, with attackers leveraging its power to outpace traditional defenses. As cybercrime costs surge, organizations must adopt strategies to bridge the cybersecurity skills gap and adopt AI to stay ahead.

Matching AI Strengths to Blue Team Needs

Much has been written about how AI, particularly Large Language Models (LLMs), will transform cybersecurity. Some say it'll be for the worse, and some say it'll be for the better. Although SURGe firmly believes that AI will end up helping defenders much more than it helps threat actors, it's sometimes hard to envision the exact form in which this help will, or should, come.

How AI Can Crack Your Passwords

As AI becomes more advanced, it's important to consider all the ways AI can be used maliciously by cybercriminals, especially when it comes to cracking passwords. Cybercriminals can use AI to perform 3 different types of password-cracking attacks: acoustic side-channel, brute force and dictionary attacks. Learn more about these AI-powered password-cracking attacks.

Simplifying Zero Trust Security for AWS with Teleport

Speakers: Managing secure access has become a critical challenge for organizations using AWS at scale. Traditional security approaches, like passwords and virtual private networks (VPNs), are not sufficient to protect growing infrastructures while maintaining productivity. This webinar, "Simplifying Zero Trust Security for AWS with Teleport," explores how Teleport enables a modern, identity-first approach to AWS access.

How Flexible Filters Enhance API Security #CybersecurityTools #SecurityFilters #ThreatAnalysis

Learn how flexible filtering and session context improve API security. Wallarm enables deep analysis of attacks, from failed logins to SQL injections, using response codes and request types. Discover why session context is essential for identifying and preventing threats.

Treasury Department Breach: A Crucial Reminder for API Security in the Public Sector

The recent cyber breach at the U.S. Treasury Department, linked to state-sponsored Chinese hackers, has set off alarm bells in the public sector. As the investigation continues, this incident reveals a pressing issue that all government agencies must confront: securing their APIs (Application Programming Interfaces).