Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Regulatory Gaps and Legacy Systems Are Aiding AI-Powered Cyberattacks on Governments

Public sector organizations face unprecedented cybersecurity challenges as artificial intelligence reshapes how adversaries launch attacks. Threat actors now use AI to execute large-scale, highly personalized phishing campaigns, automate the discovery of vulnerabilities, and evade detection faster than traditional defenses can respond.

Grounded: The ARINC vMUSE Attack Disrupting Multiple Airports

The line between the digital and physical worlds blurs completely when a cyber attack results in widespread, tangible disruption. For thousands of travelers, this became a harsh reality when major European airports were forced to delay flights due to a ransomware attack targeting a vendor in the supply chain.

US Secret Service Blocks Massive Telecom Attack in New York

The Secret Service’s takedown in New York shines a light on a type of threat that is technically fascinating and deeply concerning for national security: large-scale cellular interception networks leveraging cell-site simulators (CSS), also known as IMSI catchers or Stingrays. The news comes as New York City hosts the annual United Nations General Assembly, gathering heads of state from around the world and creating an incredibly target-rich environment for attackers.

When Attackers Weaponize AI and Defenders Fight Back with Smarter Remediation

Artificial intelligence is transforming cybersecurity, and not always for the better. Attackers are now weaponizing AI to speed up reconnaissance, create exploit code, and bypass traditional defenses. Security teams can’t afford to rely on outdated vulnerability management practices. In this webinar, Scott Kuffer (COO, Nucleus Security) and Corey Brunkow (Director of Federal Operations, Horizon3.ai) break down how AI is changing the threat landscape and what defenders can do to stay ahead.

When Firewalls Age Out: What the Akira Attack Can Teach Us About Lifecycle Security

Cyberattacks evolve faster than aging infrastructure can keep up, and expired hardware is one of the biggest blind spots organizations face today. The recent Akira ransomware campaign targeting SonicWall VPNs is a powerful reminder of what happens when devices slip out of support.

Jaguar Land Rover Cyberattack: Why IoT Identity and Access Management is Mission Critical

The recent cyberattack on Jaguar Land Rover (JLR), which forced factory closures and disrupted production, is another reminder of how vulnerable connected industries have become. Modern automotive and manufacturing operations rely on networks of connected devices, from robotic arms on the production line to electronic control units (ECUs) inside vehicles. When security breaks down, the consequences quickly ripple across operations, supply chains, and customers.

No More Ransom: Why the UK's Crackdown Signals the End of Paying Hackers

For years, ransomware gangs have thrived by holding businesses hostage, forcing a terrible choice: pay up or watch your systems collapse. That era is ending. After a summer of cyber chaos that hit everything from the NHS to Harrods, the UK government has drawn a red line: no more quiet payoffs, no more sweeping attacks under the rug.

6 Steps to Counter Fourth-Party Supply Chain Vendor Attacks

Managing a cybersecurity program is hard, but also very meaningful, work. Continuously managing the cybersecurity posture of your organization’s supply chain vendors can at times feel near impossible, afterall ensuring the cybersecurity of your suppliers is an order of magnitude leap in difficulty. Yet, criminals are demonstrating that despite these difficulties, this task requires our immediate attention, given the trending success in exploiting our businesses' trusted relationships.