Category: EN

SoundCloud – 29,815,722 breached accounts

In December 2025, SoundCloud announced it had discovered unauthorised activity on its platform. The incident allowed an attacker to map publicly available SoundCloud profile data to email addresses for approximately 20% of its users. The impacted data included 30M unique…

The 7 Essential Elements of a Compliance Framework You Need to Know

Key Takeaways Regulatory expectations continue to expand. Oversight bodies increasingly look beyond documentation to how organizations manage compliance risk in practice. In this environment, compliance functions best when supported by a structured framework. While industries and jurisdictions vary, effective, high-quality…

Who Operates the Badbox 2.0 Botnet?

The cybercriminals in control of Kimwolf — a disruptive botnet that has infected more than 2 million devices — recently shared a screenshot indicating they’d compromised the control panel for Badbox 2.0, a vast China-based botnet powered by malicious software…

What exciting new developments are happening in NHIs?

Are Organizations Prepared for the Challenges of Non-Human Identities? Understanding Non-Human Identities in Cybersecurity How do organizations safeguard their machine identities? One emerging focus is the management of Non-Human Identities (NHIs), a paramount aspect of digital protection. NHIs comprise machine…

Why be optimistic about the future of secrets management?

How Does Non-Human Identity Management Revolutionize Secrets Security? Is your organization effectively managing its non-human identities (NHIs)? With the growing complexity of interconnected systems and the surge of machine identities, securing these non-human entities has become a cornerstone in protecting…

How smart can NHIs be in complex enterprise environments?

What Are Non-Human Identities and Why Do They Matter in Complex Enterprise Environments? Where digital transformation accelerates work processes, the concept of Non-Human Identities (NHIs) becomes increasingly important among enterprise environments. But what exactly are NHIs, and why should organizations…

Can Agentic AI operate independently in high-stakes areas?

Can Independent Agentic AI Safeguard Our Critical Systems? Have you ever wondered how we can entrust critical operations to independent systems? The emergence of Agentic AI, with its capacity to operate autonomously, has sparked considerable discussion about its potential role…

Claude expands tool connections using MCP

Anthropic has added interactive tool support to its Claude AI platform, a change powered by the open Model Context Protocol (MCP). The update lets users work directly with external applications inside Claude’s interface rather than relying solely on text interactions…

10 cybersecurity trends to watch in 2026

<p>As cybersecurity leaders begin 2026, they face yet another year of escalations. The attack surfaces they defend are becoming bigger and more complex, while the risks and threats facing their organizations are increasing in volume, velocity and sophistication.</p> <p>It’s a…