The Cybersecurity and Infrastructure Security Agency (CISA), a key agency responsible for protecting the United States’ critical infrastructure, has taken a significant step by instructing its threat hunting team to cease using VirusTotal—a widely used cybersecurity tool—by April 20, 2025.…
Tag: Cybersecurity Insiders
Cyber insurance providers: Friends not foes
The relationship between an insurance provider and the insured is often described as adversarial: one party reluctantly pays a premium, while the other is reluctant to pay out if possible. But cyber insurance doesn’t have to be this way. The…
Below the Surface: The Iceberg of Known Vulnerabilities
Have you ever heard the saying, “Better the devil you know than the devil you don’t”? In short, it’s better to take a risk with something or someone you understand. In cybersecurity, that’s not really the case. The devils we…
Cybersecurity Blogs: What You Should Know in 2025
There are many blogs about cybersecurity. Some blogs are for people who are not experts. They help you learn how to stay safe online. Other blogs are for professionals who work in cybersecurity. These blogs talk about deep topics like…
Data quality and AI: Why innovation can’t outrun governance
AI is no longer the technology of tomorrow; it’s today’s most pressing business opportunity. According to recent findings from Semarchy, an overwhelming 75% of organisations plan to invest in AI technologies in 2025 alone. This surge in interest reflects AI’s…
How Cybercriminals Are Exploiting Technology to Scam Taxpayers
In an era where artificial intelligence (AI) is revolutionizing industries across the board, cybercriminals are not far behind in leveraging this powerful technology for nefarious purposes. The landscape of tax fraud and Internal Revenue Service (IRS) scams is undergoing a…
Good Non-Human Identity Governance Means Maturing Your Enterprise Secrets Management
Learn why enterprise secrets management is a key component to building a robust non-human identity governance model and is required for securing the whole organization. When you think of identity and access management (IAM), you traditionally think of humans. We’ve…
Saudi Cyber Innovation: Redefining SOC Operations
Launch of COGNNA at RSA 2025 Security teams today face an unstoppable challenge—one that isn’t just about technology but about operational endurance. For years, SOC analysts have been inundated with alerts, struggling with fragmented tools and siloed systems that require…
Fog Ransomware Gang Now Demands $1 Trillion: A Curious Twist Tied to DOGE and Elon Musk
The Fog Ransomware gang, which has been making headlines over the past week due to its increasingly audacious demands, is now requesting a staggering $1 trillion from its victims. However, this isn’t a straightforward ransom demand like we typically see…
Lattica Emerges from Stealth to Solve AI’s Biggest Privacy Challenge with FHE
Tel Aviv, Israel, 23rd April 2025, CyberNewsWire The post Lattica Emerges from Stealth to Solve AI’s Biggest Privacy Challenge with FHE first appeared on Cybersecurity Insiders. The post Lattica Emerges from Stealth to Solve AI’s Biggest Privacy Challenge with FHE…