Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Inside A Government Agency With No Threat Model

A central government department relied on a part time virtual security lead, ageing tools and no central view of security data, with nobody owning real decisions. When asked what type of attacker would target their systems or whether they had a threat led defence, nobody from engineering to leadership had an answer, despite direct access to national guidance.

How Hackers Used Distraction To Rob Gaming Giant Ubisoft

Attackers broke into major gaming platform Ubisoft and started spraying free in-game currency, triggering confusion as teams tried to understand the sudden rush of skins and purchases. While everyone focused on the noisy mess, the intruders quietly stole source code for the full game catalogue, walking away with the real prize.

How Agentic Tool Chain Attacks Threaten AI Agent Security

AI agents are rapidly transforming enterprise operations. Unlike traditional software that follows fixed code paths, AI agents interpret prompts, form plans, select tools, and react to results in a continuous loop. At the heart of this capability is the agent's ability to actively select and execute capabilities based on natural language descriptions, schemas, and examples.

Par for the Course: Why Golf Facilities Are Prime Targets for Cyberattacks

Golf can be an incredibly frustrating game to play. The great Winston Churchill described golf as "a game whose aim is to hit a very small ball into an even smaller hole, with weapons singularly ill-designed for the purpose.” Interestingly, cybersecurity professionals face the exact opposite problem.

Types of Web App Attacks Explained by Experts

Web applications process billions of transactions every day, handling everything from user credentials to financial records. This constant exchange of data makes them prime targets for attackers who are looking to gain access for data theft or service disruption. Web application security vulnerabilities are highly sophisticated attack vectors that can exploit authentication flows, business logic, and API integrations.

The Top 5 Vulnerabilities Attackers Are Using Against Your Vendors (And What It Says About Third-Party Risk)

When threat actors target your vendors, they’re not just looking to exploit a system for a single attack. They’re looking for every opportunity to scale up their operations. This means seeking ways to push their compromises as far downstream into the supply chain as they can go.

The Rise of DLL Side-Loading Cyber Attacks and Browser Data Theft

Content originally created and published by Venak Security. Cybercriminals are increasingly adopting stealthy and advanced techniques, notably Dynamic-Link Library (DLL) side-loading and browser memory scraping, to install malware that stealthily harvests users’ passwords, credit card data, cookies, session tokens and more. These attacks blend social engineering, search manipulation and memory-level exploitation to bypass traditional defenses and compromise victims at scale.

Anatomy of a Vishing Attack: Technical Indicators IT Managers Need to Track

If your organization hasn’t encountered a vishing attack yet, it’s probably only a matter of time. Vishing, or voice phishing, is a sophisticated type of social engineering that adds a whole new dimension to common scams. Rather than emails or text messages, threat actors employ phone calls or online voice calls to carry out vishing schemes. Particularly savvy attackers can even copy a real person’s voice to deceive, coerce, or manipulate potential victims.

8 Ways Organizations Reduce Exposure to Social Engineering Attacks

It is not always malware or a sophisticated tool that results in cyber threats. Sometimes, this happens through a convincing email or a request that appears trustworthy. There have been occasions where attackers created a moment of urgency to lead someone into clicking, sharing, or approving without realizing the consequences. This is social engineering. Social engineering threats are becoming more dangerous.