Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Acronis Cyberthreats Report H2 2025: Cybercriminals are now scaling attacks with AI

Cybercriminals are spending less time using AI to develop new kinds of cyberattacks. Unfortunately, that’s not good news. According to the Acronis Cyberthreats Report H2 2025, cybercriminals are focusing on using AI to scale and refine the attacks they’ve already developed. As a result, they’re working more efficiently. The Acronis Cyberthreats Report H2 2025 delves into many more cybersecurity trends and goes into much deeper detail on the evolving impact of AI on cyberthreats.

Snyk and Cline: Securing the Future of Autonomous Coding

We are thrilled to announce a strategic partnership with Cline Bot Inc. to bridge the gap between autonomous speed and enterprise trust. By embedding Snyk’s security intelligence directly into Cline’s autonomous loops, we are delivering an end-to-end automated secure coding workflow that empowers developers to innovate with confidence. The evolution of AI coding tools is accelerating rapidly. We have moved from simple completion to sophisticated chat, and now to full autonomy.

GrayZone Platform

BlueVoyant analyzed a sophisticated and extensive campaign that leverages corporate shell companies, professional infrastructure, and code-signing certificates to distribute potentially unwanted applications (PUAs). This operation has established a persistent, platform-like foothold on user systems through software that presents a façade of corporate legitimacy. It combines continuous system access with ongoing data collection.

Remediate transitive vulnerabilities faster with Datadog Software Composition Analysis

Security teams are responsible for finding and remediating vulnerable dependencies within applications that are built from large ecosystems of frameworks, SDKs, and utilities. What makes this task especially challenging is that these dependencies can pull in dozens or even hundreds of transitive dependencies through complex dependency chains. Even when scanners identify what’s vulnerable, teams still often lack the information they need about the dependency chain to safely address the issue.

Introducing Abilities API in WordPress Plugins

WordPress released version 6.9 in December 2025, introducing a new framework that changes how the platform communicates with external tools. The update added support for WordPress Abilities API and the Model Context Protocol (MCP), allowing WordPress sites and plugins to describe their capabilities in a structured, machine- and human-readable format. The change reflects a broader shift in how websites are managed.

Navigating the Agentic AI Era: Forward's Perspective from Cisco Live EMEA

Cisco Live EMEA 2026 Amsterdam has officially wrapped up, and the path forward is clear: we have entered the Agentic AI Era. The event was centered around an industry shift towards a unified platform where AI agents don't just respond; they act. At Forward Networks, we aren’t just watching this shift happen; we are providing the foundation required to make it a reality.

Is Google Drive Safe for Your Private Files?

Google Drive is the most popular cloud storage solution in the market with over 2 billion users worldwide. Despite this, due to recent concerns and more interest in online privacy, more people are asking is Google Drive safe for their files, photos, and videos. Of course, Google Drive and Google One offer advanced security and privacy features, but it falls short in privacy.

How Passkey Management Works in Keeper

Keeper’s passkey management works by letting you create, store and use passkeys directly from your Keeper Vault so you can sign in with biometric or device-based authentication instead of traditional passwords. By removing shared secrets and replacing them with cryptographic credentials tied to your device, Keeper makes signing in faster, more secure and resistant to phishing attacks.

LevelBlue Named a Representative Vendor in 2026 Gartner Market Guide for Outsourced Managed Security Services

LevelBlue is proud to announce it has been named a Representative Vendor in the just-released 2026 Gartner Market Guide for Outsourced Managed Security Services (OMSS). OMSS, which is a subset of Managed Security Services, provides organizations with specialized external expertise and operational support for critical cybersecurity functions.