Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Scam-Proofing Loyalty at Scale: What ATO Protection in Retail Should Look Like in 2025

Retail fraud has gone public. It no longer happens quietly in the background. Today’s scams are faster, sharper, and designed to look exactly like your brand. A spoofed checkout flow can harvest thousands of credentials before your SOC team even sees a spike. But the real damage isn’t always technical. In 2025, one impersonation scam can trigger waves of fake complaints, social media outrage, and reputational backlash that cost far more than the fraud itself.

Product update: Dynamic API Scanning, Recommendations & Classifications, and more

We know the importance of staying ahead of threats. At Detectify, we’re committed to providing you with the tools you need to secure your applications effectively. This update covers our new Dynamic API Scanning feature, updates over the last few months, and the latest additions to our vulnerability testing capabilities.

A Single Cyberattack Stopped Jaguar Land Rover-and Could Stop You Next

The $2 Billion Cyber Disaster That Shook the Automotive World On September 2, 2025, Jaguar Land Rover (JLR) suffered a automotive cyberattack that instantly froze production lines, shutdown the dealerships and paralyzed the luxury automaker’s global IT systems during the UK’s “New Plate Day”—one of the busiest times for the industry.

Introducing Observatory and Smart Shield - see how the world sees your website, and make it faster in one click

Modern users expect instant, reliable web experiences. When your application is slow, they don’t just complain — they leave. Even delays as small as 100 ms have been shown to have a measurable impact on revenue, conversions, bounce rate, engagement and more.

Cloudflare just got faster and more secure, powered by Rust

Cloudflare is relentless about building and running the world’s fastest network. We have been tracking and reporting on our network performance since 2021: you can see the latest update here. Building the fastest network requires work in many areas. We invest a lot of time in our hardware, to have efficient and fast machines. We invest in peering arrangements, to make sure we can talk to every part of the Internet with minimal delay.

CVE-2025-20333: Authenticated RCE in Cisco ASA / FTD VPN Web Server

A high-severity vulnerability (CVSS 9.9) has been disclosed in the VPN web server component of Cisco Secure Firewall ASA and FTD software. An authenticated attacker (i.e. one possessing valid VPN credentials) can send specially crafted HTTP(S) requests that bypass input validation and lead to remote code execution as root. This means full device compromise is possible.

The Behavioral Science Behind the Click

Welcome back. In our last blog post, we talked about the great divide between tech-focused and people-focused security. Now, let’s get nerdy and talk about the fascinating, complex, and occasionally infuriating operating system at the heart of the problem: the human brain. Ever wondered why that "Urgent Invoice" email from a brand-new supplier creates an immediate jolt of anxiety that makes you want to click? That’s not a logic failure; it’s a feature.

The Dawn of the Agentic SOC: Reimagining Cybersecurity for the AI Era

At Fal.Con 2025, I had the privilege of addressing over 8,000 cybersecurity professionals about something that’s on my mind – and should be on all of ours: how do we fundamentally reimagine security for the age of AI? We're living through the fourth industrial revolution. The first brought us steam power, the second electricity, and the third the digital age we all know and love.

What Businesses Learn from the Top Web Designer in Singapore

Digital growth depends on effective websites. Companies that want strong online visibility study industry leaders carefully. A Top Web Designer in Singapore demonstrates how design impacts branding, user trust, and long-term success. Modern websites go beyond attractive visuals. They combine structure, speed, and seamless user interaction. Design influences credibility, and customers often judge brands by online appearance. The process requires more than technical skills.