Category: EN

No, there isn’t a world ending Apache Camel vulnerability

Posts have been circulating publicly on the internet for several days about a “critical”, end of the world “zero day” in Apache Camel, CVE-2025–27636. Many of the posts explained in specific detail about how to exploit the vulnerability — despite the fact…

FBI alerts Gmail users over Medusa Ransomware

The FBI, America’s federal law enforcement agency, has issued an urgent warning to all Gmail users about an ongoing hacking campaign carried out by the operators of Medusa Ransomware. According to the FBI, this cybercriminal group is notorious for encrypting…

OpenAI Pushes for Federal-Only AI Regulation

OpenAI has officially called on US lawmakers to exempt it from complying with state-level AI regulations, instead urging a unified approach under federal AI rules. It argues that a consistent, nationwide framework is critical to maintain US leadership in AI…

Top 5 threats keeping CISOs up at night in 2025

Cyber threats in 2025 require a proactive, adaptive approach. To stay ahead, CISOs must balance technical defenses, regulatory expectations, and human factors. By prioritizing AI-driven security, ransomware resilience, supply chain risk management, insider threat mitigation, and compliance preparedness, CISOs can…

Top 10 Best Cyber Attack Simulation Tools – 2025

Cyber attack simulation tools help organizations identify vulnerabilities, test security defenses, and improve their cybersecurity posture by simulating real-world attacks. These tools range from breach and attack simulation (BAS) platforms to adversary emulation frameworks. Here are some of the top…

New infosec products of the week: March 14, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Alloy, Detectify, Pondurance, and SimSpace. SimSpace Stack Optimizer allows organizations to measure their security technologies Stack Optimizer is designed to help organizations make informed, strategic…

What role do APIs play in automating NHI management?

Could API Automation Be The Missing Piece In Your NHI Management? One critical question stands out: Could the underutilized potential of API automation be the missing piece in your Non-Human Identities (NHI) management strategy? With the increasing complexity of cloud…

How can I integrate automated NHI auditing into our pipeline?

How Can Automated NHI Auditing Enhance Your Cybersecurity Strategy? Is your organization struggling with managing the ever-increasing volume of Non-Human Identities (NHIs) within your IT infrastructure? The NHI universe comprises machine identities created by combining a unique identifier or ‘Secret’…