2025 Threat Landscape in Review: Lessons for Businesses Moving Into 2026 andrew.gertz@t… Thu, 01/15/2026 – 16:48 Nadav Avital | Senior Director of Threat Research at Thales More About This Author > 2025 was a year that tested how businesses think…
Tag: Security Boulevard
AI Security: What Enterprises Are Getting Wrong
The CSA Alliance has released their annual report on AI and security. Alan, Anton Chuvakin and Hillary Baron discuss the state of AI security and governance, how companies are actually adopting AI (both agentic and generative) and most importantly how…
The Next Security Battleground: Agentic Identity
Shahar Tal, CEO and co-founder of Cyata, discusses how the company is building the control plane for agentic identity. With deep roots in Israel’s Unit 8200 and Check Point, Cyata is tackling one of the next big security challenges: governing,…
We’re Moving Too Fast: Why AI’s Race to Market Is a Security Disaster
The recently disclosed ServiceNow vulnerability should terrify every CISO in America. CVE-2025-12420, dubbed “BodySnatcher,” represents everything wrong with how we’re deploying AI in the enterprise today. An unauthenticated attacker—someone who has never logged into your system, sitting anywhere in the…
Report: Massive Amounts of Sensitive Data Being Shared with GenAI Tools
A new Harmonic Security report reveals a sharp rise in sensitive data shared with generative AI tools like ChatGPT, increasing the risk of security breaches, compliance violations, and data exposure across global organizations. The post Report: Massive Amounts of Sensitive…
Classroom Device Management: 8 Strategies for K-12 Success
Digital devices now shape daily instruction in K–12 classrooms. Laptops, tablets, and phones support research, collaboration in the classroom, and blended learning. Many schools also cater for bring your own device (BYOD) environments. These tools can unlock engagement and creativity,…
Delinea Acquries StrongDM to Secure Access to IT Infrastructure
Delinea announces the acquisition of StrongDM to enhance its privileged access management platform, offering just-in-time access for IT infrastructure and improving cybersecurity for human and non-human identities. The post Delinea Acquries StrongDM to Secure Access to IT Infrastructure appeared first…
Arcjet Python SDK Sinks Teeth Into Application-Layer Security
A new Arcjet SDK lets Python teams embed bot protection, rate limiting, and abuse prevention directly into application code. The post Arcjet Python SDK Sinks Teeth Into Application-Layer Security appeared first on Security Boulevard. This article has been indexed from…
What innovations do NHIs bring to cloud security
How Are Non-Human Identities Revolutionizing Cloud Security? What drives the evolution of cybersecurity? The answer often lies in the innovative management of non-human identities (NHIs). With the unprecedented surge in cloud adoption, the challenge of securing machine identities and their…
Can Agentic AI keep your data protection strategies ahead
How Can Advanced AI Strategies Transform Data Protection? How do organizations ensure that their data protection strategies remain cutting-edge and resilient against evolving threats? For many cybersecurity professionals, the key lies in harnessing the potential of Agentic AI. Advanced AI…
How do you trust a machine with secret management
How Do Organizations Ensure Machine Trust in Secret Management? How can organizations ensure that machines, which are increasingly handling vast amounts of sensitive data, can be trusted with secret management? With digital landscpe evolves, machine identities are taking center stage.…
Are NHIs scalable for growing tech ecosystems
How Does Non-Human Identity Management Enhance Scalability in Tech Ecosystems? Is your organization struggling to keep pace with the scalability demands of emerging tech? With technology grow and evolve, the role of Non-Human Identities (NHIs) in ensuring seamless operations becomes…
Microsoft, Law Enforcement Disrupt RedVDS Global Cybercrime Service
Microsoft and law enforcement agencies in Europe disrupted the operations of RedVDS, a global cybercrime service that sold cheap and disposable dedicated virtual servers to threat actors that used them to run BEC, phishing, and other fraud campaigns. The vendor…
CVE-2025-64155: Exploit Code Released for Critical Fortinet FortiSIEM Command Injection Vulnerability
Exploit code has been published for CVE-2025-64155, a critical command injection vulnerability affecting Fortinet FortiSIEM devices. Key takeaways: CVE-2025-64155 is a critical operating system (OS) command injection vulnerability affecting Fortinet FortiSIEM. Fortinet vulnerabilities have historically been common targets for cyber…
Living Security Adds AI Engine to Surface Risky End User Behavior
Living Security revealed it is beta testing an artificial intelligence (AI) engine on its platform that continuously analyzes billions of signals to predict risk trajectories, recommend the most effective actions, and automate routine interventions to better secure employees and, by…
CrowdStrike Acquires Browser Security Startup Seraphic in Latest Buying Spree
CrowdStrike Holdings Inc. announced Tuesday it has signed a definitive agreement to acquire Seraphic Security, a browser security startup, marking the cybersecurity giant’s fourth acquisition since August and its second in less than a week. While CrowdStrike did not disclose…
AppOmni Surfaces BodySnatcher AI Agent Security Flaw Affecting ServiceNow Apps
AppOmni, a provider of a platform for securing software-as-a-service (SaaS) applications, this week disclosed it has discovered a flaw in the ServiceNow platform that could be used to create a malicious artificial intelligence (AI) agent. Dubbed BodySnatcher (CVE-2025-12420), AppOmni researchers…
EasyDMARC Expands Executive Team with Armen Najarian as Chief Commercial Officer
Originally published at EasyDMARC Expands Executive Team with Armen Najarian as Chief Commercial Officer by Anush Yolyan. DOVER, DE, UNITED STATES, January 14, 2026 — … The post EasyDMARC Expands Executive Team with Armen Najarian as Chief Commercial Officer appeared…
Threat Actor Teases Source Code for Sale After Hack of Target Systems
Hackers posted online what they said were samples of about 860 GB of internal source code, developer documentation, and other data taken from systems of giant U.S. retailer Target and is reportedly offering to sell the stolen information. The post…
DORA penetration testing and threat-led exercises explained
The Digital Operational Resilience Act (DORA) introduces a unified framework for managing ICT risk across the European financial sector, with key requirements, including penetration testing, coming into force in 2026. Its aim is to ensure that regulated organisations, and the…