Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Tag Manager Security: How to Control GTM, Adobe Launch & Tealium for Privacy Compliance

Marketing needs to ship campaigns in hours. IT and engineering move in days. Tag managers live at the center of that conflict. They’re essential infrastructure, enabling marketing velocity by letting marketing teams deploy analytics, advertising pixels, and conversion tracking without IT or production bottlenecks. So campaigns launch faster, testing happens in real time, and teams optimize performance mid-campaign. But that same architecture can create compliance exposure.

How AI is Reshaping Cyber Threats

In Episode of Guardians of the Enterprise, Ashish Tandon, Founder & CEO, Indusface, spoke with Madhur Joshi, CISO at HDB Financial Services (part of the HDFC Group), about how AI is reshaping the cyber threat landscape. They discussed how attackers are now leveraging AI to launch more sophisticated phishing campaigns, automate malware, and scale attacks faster than ever before. As AI lowers the barrier to entry, the speed and complexity of attacks continue to increase, making it harder for organizations to keep up.

Report: AI-Driven Fraud Surged by 1200% in December 2025

AI-driven fraud attacks spiked by more than 1200% in December 2025, according to a new report by Pindrop Security. Threat actors are using AI to assist in every stage of the attack, from deploying bots to conduct reconnaissance to using deepfakes to trick humans. “According to Pindrop internal data, AI fraud (or non-live fraud) surged 1210% by December 2025,” the researchers write.

AI-Assisted Social Engineering Attacks Continue to Rise

Social engineering remained the top initial access vector for cyberattacks in 2025, with increasing assistance from AI tools, according to a report from ThreatDown. The researchers warn that AI will likely become a core component of social engineering attacks throughout 2026. “Deepfake voice, image, and video impersonation now requires minimal expertise and only a handful of reference images or seconds of audio,” the researchers write.

SafeBreach's Evolution into an AI-First Development Team: Part I

In this first installment of a series on the transformation of SafeBreach’s development organization, VP of Development Yossi Attas outlines how his team is managing the strategic shift toward an AI-First development methodology. This includes moving beyond simple tool adoption to a fundamental redefinition of the software engineer’s role. Read on as we explore.

Disclosure: XWiki CSS Injection (CVE-2026-26000)

During independent security research, a CSS injection vulnerability (CVE-2026-26000) was identified in the XWiki platform. XWiki is an open-source enterprise wiki and collaboration platform commonly used for internal documentation and knowledge management. According to XWiki, the platform has over 8,000 active installations and is used by organisations such as Lenovo and Amazon, meaning vulnerabilities can affect a large and diverse user base.

AWS and Cloudflare Outages: How GitProtect Keeps Your Operations Running

The assumption that you’re ‘too big to fail’ or ‘too small to get noticed’ simply doesn’t hold water anymore. The year 2025 showed us once again that even the largest names on the market are not invincible. The same is true for any company that depends on their infrastructures. Without a real Plan B, your business’s reliance on cloud tech giants might be risky.

Empowering CISOs with AI: Discover powerful hopes and real risks

Artificial intelligence has become the ultimate paradox for today’s security leaders: it is simultaneously their sharpest new instrument and their biggest emerging attack surface. As boards push hard to “put AI everywhere,” CISOs must balance innovation with accountability, often in environments where AI pilots are already live before security is invited to the table.

Top 10 Disk Recovery Service Providers in the UK

Data loss can be costly for both individuals and businesses, making reliable disk recovery services essential. Whether files are lost due to hardware failure, accidental deletion, or malware, choosing a trusted provider can be the difference between recovery and permanent loss. Below, we highlight the top 10 disk recovery service providers in the UK, showcasing companies known for expertise, reliability, and secure service.

Understanding Instagram Follower Behavior with RecentFollow

Tracking Instagram follower behavior can sometimes appear very chaotic, and therefore difficult to really determine the value of your content that could have contributed to the change in followers. Sometimes you will see a large increase in followers in one week, then the next week see little or no changes.