Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

More Than The Sum of its Parts: Combining EASM and Pentesting

In late April 2025, SAP released an emergency patch for a critical vulnerability in SAP NetWeaver, sending security teams across Europe scrambling to assess their exposure. The flaw, CVE-2025-31324, was rated critically severe, and the details that followed made clear why. Media reports quickly revealed the full scope. SAP NetWeaver Visual Composer allowed unauthenticated malicious file uploads through a specific HTTP API endpoint (/developmentserver/metadatauploader).

A Guide on How to Find Old Emails in Microsoft 365 (Office 365)

Microsoft Exchange and Outlook email services are among the most popular email applications in business environments. Sometimes, new users cannot find old emails in the Outlook client or Outlook web application after three or twelve months. One of the possible reasons may be improper synchronization settings in Outlook. Read this blog post to discover how you can find old emails and get Outlook emails back.

Back to the Fundamentals: Reflections from the IACIS BCFE Event in Orlando

In today’s cybersecurity landscape, speed is often treated as the ultimate objective. Organizations are racing to adopt AI-driven technologies, automate workflows, reduce response times, and deliver faster outcomes. Digital forensics is no exception. Forensic examiners increasingly rely on tools that automate large parts of the analysis process, helping reduce the time required for complex investigations. But this raises an important question: at what cost?

AI Alone Won't Stop the Breach: Why Email Security Needs Humans-on-the-Loop

2026 has officially become the year of speed, scale and support. The delta between a phishing email landing and a full organizational compromise has shrunk to mere seconds. The reality by the numbers: To close this window, your defense strategy must evolve into a two-step strategy of accuracy and automation.

How Agentic AI and Automation Are Changing Cybersecurity

There is no question that AI is changing cybersecurity in a massive way. In many respects, its impact is comparable to the rise of the internet. AI tools are helping organizations improve efficiency, automate repetitive tasks, and process data at a speed humans simply cannot match. Unfortunately, the same technology helping defenders is also being adopted by cybercriminals just as quickly. For cybersecurity professionals, keeping up with AI and agentic developments is no longer optional.

How to Prevent Credential Stuffing Attacks: Beyond MFA and Rate Limiting

Most organizations think MFA and rate limiting are enough to stop credential stuffing. They aren’t. Attackers have adapted, and the controls that worked five years ago are now routinely bypassed using residential proxy networks, low-and-slow automation, and real-time session token interception.

Postman Workspace Exposure: When Your API Test Suite Becomes a Security Risk

Let’s start with a scenario. This is illustrative, not a single reported incident. A developer shares a Postman collection in Slack to move faster. “Here’s the Postman collection for the payment API. It has live auth headers so you can test prod endpoints.” The team uses it, work gets done, and the link stays. What no one realizes is that the collection lives inside a public Postman workspace. Weeks later, it is indexed by search engines. The URL requires no login.

Solving Common DSPM Challenges for Enterprises

Most data security posture management (DSPM) programs don't fail because the technology is wrong. They fail because of execution gaps, from incomplete data inventory to misclassified data at scale to fragmented cloud environments and teams stretched too thin to act on findings. However, each of these problems is predictable, and each has a known fix.

Drupal Core SQL Injection Vulnerability (CVE-2026-9082)

In May 2026, the Drupal Security Team disclosed a critical SQL injection vulnerability affecting Drupal core. The issue, tracked as CVE-2026-9082, affects Drupal installations using PostgreSQL and has been assigned a Drupal security risk rating of 23/25. The vulnerability can be exploited by anonymous users, and Drupal has confirmed that exploit attempts are being detected in the wild.