Analytics & Intelligence

How AI in Cybersecurity Fights Growing AI Threats?
Do you know, the digital devices we use are expected to generate an overwhelming 79 zettabytes of data by 2025. With such huge amounts of data, conventional and manual methods of cybersecurity ...

California Man Will Plead Guilty to Last Year’s Disney Hack
A 25-year-old California man will plead guilty to hacking into a Disney's personal computer and using stolen credentials to break into thousands of Disney Slack channels. Ryan Mitchell Kramer, who claimed to ...

Why EASM Projects Fail: Three Pitfalls to AvoidÂ
If you avoid the pitfalls detailed in this article, then EASM can provide a great defense against two-thirds of your breach problem. ...

Treasury Moves to Ban Huione Group for Laundering $4 Billion
The Treasury Department is moving to cut off Huione Group, a Cambodian conglomerate, from the U.S. financial system, saying the firm and its multiple entities laundered billions of dollars for North Korea's ...
Three Must-Have Capabilities to Prepare for 47-Day TLS Certificates
Recently, the CA/Browser (CA/B) Forum approved Ballot SC-081v3, launching a gradual reduction of public TLS certificate lifespans—from today’s 398 days down to just 47 days by 2029. This landmark change ranks among ...

Anthropic Outlines How Bad Actors Abuse Its Claude AI Models
Anthropic shows how bad actors are using its Claude AI models for a range of campaigns that include influence-as-a-service, credential stuffing, and recruitment scams and becomes the latest AI company to push ...

Cisco Unveils Open Source AI Reasoning Model for Cybersecurity Use Cases
Cisco today at the 2025 RSA Conference revealed it is making available an open-source generative artificial intelligence (AI) reasoning model specifically designed to automate cybersecurity analytics and workflows, along with a set ...
Webinar Recap: How AI is Revolutionizing Cybersecurity in Healthcare
Protecting patient data isn’t just about keeping up with regulations; it’s about safeguarding lives and preserving trust. For healthcare organizations like City of Hope, cybersecurity is a mission-critical responsibility. A breach can ...

North Korean Group Creates Fake Crypto Firms in Job Complex Scam
The North Korean hackers behind the Contagious Interview worker scam, which threat intelligence analysts have followed since late 2023, are now hiding behind three bogus crypto companies they created as fronts for ...

Build smarter with AI and your software supply chain
AI adoption is reshaping how software gets built. From coding assistants to full-fledged agentic AI applications, developers now routinely rely on artificial intelligence in their workflows. But a subtler shift is also ...