
Cybersecurity

7 API discovery best practices for complete visibility | TechTarget
APIs often have access to sensitive data, making it critical for organizations to know about every single API in use. Yet many companies struggle with shadow APIs and undocumented endpoints. You can’t protect what you can’t see, making comprehensive API visibility fundamental to any security program. Effective API discovery requires a systematic approach that…

SpyCloud Report: 2/3 Orgs Extremely Concerned About Identity Attacks Yet Major Blind Spots Persist
Austin, Texas, USA, September 23rd, 2025, CyberNewsWire New SpyCloud 2025 Identity Threat Report reveals dangerous disconnect between perceived security readiness and operational reality. SpyCloud, the leader in identity threat protection, today released the 2025 SpyCloud Identity Threat Report, revealing that while 86% of security leaders report confidence in their ability to prevent identity-based attacks, 85%…

Cybercriminals are going after law firms’ sensitive client data – Help Net Security
Regardless of their size, all law firms hold valuable data, including client communications, financial records, and confidential legal strategies. That data has never been more at risk. Cybercriminals are targeting law firms by exploiting vulnerabilities, weak passwords, outdated systems, and untrained staff. Experts say law firms fall into three groups when it comes to cybersecurity….

K-12 schools face cybersecurity risks inside and outside of the classroom
Phishing was the most common access vector for ransomware infections at lower education institutions over the past year As schools continue to expand their digital footprint, the threat of phishing, spam, and other cyberattacks is increasingly impacting institutions for students up to 18 years old. These institutions may be referred to as primary, elementary, and…

Gamaredon X Turla collab
In this blogpost, we uncover the first known cases of collaboration between Gamaredon and Turla, in Ukraine. Key points of this blogpost: In February 2025, we discovered that the Gamaredon tool PteroGraphin was used to restart Turla’s Kazuar backdoor on a machine in Ukraine. In April and June 2025, we detected that Kazuar v2 was…

UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware
An Iran-nexus cyber espionage group known as UNC1549 has been attributed to a new campaign targeting European telecommunications companies, successfully infiltrating 34 devices across 11 organizations as part of a recruitment-themed activity on LinkedIn. Swiss cybersecurity company PRODAFT is tracking the cluster under the name Subtle Snail. It’s assessed to be affiliated with Iran’s Islamic…

Meet ShadowLeak: ‘Impossible to detect’ data theft using AI
For years threat actors have used social engineering to trick employees into helping them steal corporate data. Now a cybersecurity firm has found a way to trick an AI agent or chatbot into bypassing its security protections. What’s new is that the exfiltration of the stolen data evades detection by going through the agent’s cloud…

What is Hardware Security? | Definition from TechTarget
Hardware security is vulnerability protection that comes in the form of a physical device rather than software installed on a computer system’s hardware. Hardware security can pertain to a device used to scan a system or monitor network traffic. Common examples include hardware firewalls and proxy servers. Less common examples include hardware security modules (HSM)…

Palo Alto Networks Acknowledges SquareX Research on Limitations of SWGs Against Last Mile Reassembly Attacks
Palo Alto, California, September 18th, 2025, CyberNewsWire SquareX first discovered and disclosed Last Mile Reassembly attacks at DEF CON 32 last year, warning the security community of 20+ attacks that allow attackers to bypass all major SASE/SSE solutions and smuggle malware through the browser. Despite responsible disclosures to all major SASE/SSE providers, no vendor has…

Gurucul’s AI-IRM accelerates insider risk detection – Help Net Security
Gurucul released its AI Insider Risk Management (AI-IRM) product, which extends autonomous triage, bias-free risk scoring, context-rich investigation, and human-AI collaboration to automate response workflows directly within insider risk operations. Organizations face a rise in insider threats, from employees, contractors and third parties to non-human accounts and AI agents. According to Cybersecurity Insiders’ 2024 Insider…