Cybersecurity

Why Image Quality Drops When Resizing a JPEG (and How to Fix It)
Ever tried resizing an image only to end up with a blurry, pixelated mess? Whether you’re adjusting a photo for a website, social media, or an email campaign, keeping your images sharp and professional is essential. But if you’ve worked with JPEG files, you’ve probably noticed how resizing can significantly impact quality. That’s where Pippit…

DragonForce targets rivals in a play for dominance
DragonForce is not just another ransomware brand – it’s a destabilizing force trying to reshape the ransomware landscape. Counter Threat Unit (CTU) researchers are actively tracking the evolution of the threat posed by the group. Enter the dragon DragonForce is involved in high-impact attacks targeting both traditional IT infrastructure and virtualized environments (e.g., VMware ESXi),…

The good, the bad and the unknown of AI: Q&A with Mária Bieliková
Artificial intelligence is on everybody’s lips these days, sparking excitement, fear and endless debates. Is it a force for good or bad – or a force we actually have yet to fully understand? We sat down with prominent computer scientist and AI researcher Mária Bieliková to discuss these and other pressing issues surrounding AI, its…

Why CTEM is the Winning Bet for CISOs in 2025
Continuous Threat Exposure Management (CTEM) has moved from concept to cornerstone, solidifying its role as a strategic enabler for CISOs. No longer a theoretical framework, CTEM now anchors today’s cybersecurity programs by continuously aligning security efforts with real-world risk. At the heart of CTEM is the integration of Adversarial Exposure Validation (AEV), an advanced, offensive…

What is Compliance Risk? | Definition from TechTarget
Compliance risk is an organization’s potential exposure to legal penalties, financial forfeiture and material loss, resulting from its failure to act in accordance with industry laws and regulations, internal policies or prescribed best practices. Compliance risk is also known as integrity risk. Organizations of all types and sizes are exposed to compliance risk, whether they…

HubSpot vs Salesforce: Which CRM Fits Your Business?
On the surface, both of these leading CRM platforms have a lot to offer, from AI to end-to-end tools covering every customer-facing task. But choosing the right CRM isn’t just about sorting through a checklist of features. Before you invest in Salesforce or HubSpot implementation services, you need to think about how well the system…

Week in review: Microsoft patches 5 actively exploited 0-days, recently fixed Chrome vulnerability exploited – Help Net Security
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Patch Tuesday: Microsoft fixes 5 actively exploited zero-daysOn May 2025 Patch Tuesday, Microsoft has released security fixes for 70+ vulnerabilities, among them five actively exploited zero-days and two publicly disclosed (but not exploited) vulnerabilities. How to give better cybersecurity presentations…

Sophos MDR: New analyst response actions for Microsoft 365
Businesses of all sizes are increasingly reliant on productivity tools like Microsoft 365 — and attackers are using this to their advantage. Business email compromise and account takeover attacks are prevalent, with adversaries accessing M365 environments using techniques that may evade detection by technology alone. Organizations need 24/7 visibility and a fully staffed security operations…

Operation RoundPress targeting high-value webmail servers
This blogpost introduces an operation that we named RoundPress, targeting high-value webmail servers with XSS vulnerabilities, and that we assess with medium confidence is run by the Sednit cyberespionage group. The ultimate goal of this operation is to steal confidential data from specific email accounts. Key points of this blogpost: In Operation RoundPress, the compromise…

Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
Cybersecurity researchers have shed light on a new malware campaign that makes use of a PowerShell-based shellcode loader to deploy a remote access trojan called Remcos RAT. “Threat actors delivered malicious LNK files embedded within ZIP archives, often disguised as Office documents,” Qualys security researcher Akshay Thorve said in a technical report. “The attack chain…