Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Rise of Vulnerability Exploits: Why Hackers Are Moving Beyond Phishing

The 2025 edition of Verizon’s Data Breach Investigations Report (DBIR) shows a new reality: about one in five confirmed breaches now starts with exploitation of a software vulnerability, a 34 percent jump over the previous year and the first time the vector has surpassed phishing.

How to Use MCP Servers with Claude Desktop | Real-Time AI Integration

In this video, I walk you through the basics of getting started with MCP servers using Claude Desktop as the client. Whether you're new to MCP servers or just looking for a smooth way to connect and explore, this step-by-step guide will help you get up and running in no time!

How to Ace ISO 27001 Vulnerability Management Audits: Steps, Tips & Tools

It’s easy to think of ISO 27001 as a simple checkbox requirement to get through quickly. Still, technical vulnerabilities in constantly changing environments require more than short-term fixes, as ISO 27001 requires a structured approach for managing them specifically. Here’s the kicker: 60% of breaches exploited known vulnerabilities for which patches were available, but were either delayed or missed. Although the policy may exist, its execution often falls short in the details.

Secure AI-Generated Code at Speed with Snyk and ServiceNow

The rapid adoption of AI coding assistants is transforming software development in ways both good and bad. Developers can produce more code faster than ever with AI, and 96% of developers report using AI coding assistants to streamline their work. AI code generation is becoming mainstream, and in late 2024, Google reported that AI writes more than 25% of its code. While GenAI tools increase productivity, they’re also creating more work for application security teams.

Follow-Up: SonicWall Updates Advisories for Actively Exploited Vulnerabilities

In a previous security bulletin sent by Arctic Wolf on April 17, 2025, we advised of a credential access campaign targeting SonicWall SMA devices along with remediation guidance. As of April 29, 2025, SonicWall has updated their advisories for several vulnerabilities that are now linked to ongoing exploitation in the threat landscape.

Zero-Day in Your ZIP: Inside CVE-2025-33028: How a WinZip Flaw Exposes Users to Silent Malware Execution

In the vast landscape of cybersecurity, it’s often not the zero-click iPhone exploits or flashy ransomware variants that expose the most users — sometimes it’s the tools we’ve trusted for decades. One such example is CVE-2025-33028, a vulnerability in WinZip, a program that’s been a staple in personal and corporate environments for over 30 years.

7 Core Principles of an Effective Application Security Program

If you’re building software, chances are your environment looks nothing like it did a few years ago. Monolithic applications have given way to microservices. On-prem systems have migrated to multi-cloud. Waterfall has become agile, and developers are pushing code daily (sometimes hourly). Security, meanwhile, is still catching up.

Threat Context monthly, April 2025: EncryptHub & Media Land leak

Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news and threat information from KrakenLabs, Outpost24’s cyber threat intelligence team. Here’s what you need to know from April about EncryptHub, EncryptRAT, and the Media Land leak.