Crypto exchange giant Coinbase has confirmed a significant data breach involving bribed support contractors, compromised customer information, and a $20 million extortion demand. The attack is expected to cost the company up to $400 million in remediation and reimbursements—and it didn’t involve a single line of malware. Here’s everything we know so far. How did […]
Data security news & resources

Hidden AI vulnerability risks that threaten your business data
AI tools have revolutionized how businesses operate, but they’ve also introduced significant security gaps. These AI vulnerabilities create pathways for sensitive information to leak outside your organization, often without anyone noticing until it’s too late. AI vulnerability in business environments When employees use AI tools to process business data, they create security holes. This type […]

Why your business needs an AI firewall: Protecting data in the age of AI
The rapid adoption of AI tools across businesses has opened new doors for productivity and innovation. But these advancements bring significant risks. When employees use AI tools without proper safeguards, sensitive company data can leak into the wrong hands. This is where an AI firewall becomes essential. What exactly is an AI firewall? An AI […]

Security training is failing. Here’s what really works.
Companies are pouring more money than ever into training their people to spot and stop cyber threats. But despite the investment, one stubborn issue won’t go away: humans are still behind the vast majority of data breaches. Even with security awareness training becoming the norm, the numbers show they’re having little impact—60% of breaches still […]

AI and the new era of credentials theft
Despite what Hollywood might suggest, most data breaches don’t involve elite hackers cracking firewalls with lines of code. In reality, all it often takes is one stolen password. Just look at the Samsung breach last month—hackers used compromised credentials to access the personal data of over 270,000 customers. This kind of incident isn’t rare. In […]

Overcoming supply chain risk with third-party management
In the past month alone, big names like Hertz, WK Kellogg, and DBS Bank have all reported serious data breaches. But these attacks weren’t the result of flaws in their own systems. Instead, attackers exploited weaknesses in their software supply chains—targeting third-party vendors to get in. This kind of breach is becoming less of an […]

AI readiness: A guide for healthcare organizations
With over 4 billion people currently lacking access to healthcare services and a projected shortage of 11 million health workers by 2030, AI might well be a savior for healthcare organizations in the next several years. From revolutionizing drug delivery to enhancing diagnostic accuracy, AI could significantly enhance both the quality of care and the […]

Human risk management: the key to mitigating account takeover attacks
Account takeover (ATO) attacks are rising year after year, despite organizations investing heavily in multi-factor authentication. The reason? Cybercriminals’ tactics are evolving—and MFA is no match. Just take last month’s phishing attack targeting Microsoft ADFS. Hackers sent fake IT emails, tricking employees into logging into a cloned ADFS page. The moment victims entered their credentials […]

4chan data breach: What we know so far
4chan has been unreachable since early Tuesday, with users reporting widespread issues and outage monitoring websites lighting up with user complaints. Speculation is spreading fast across rival forums and social platforms about what’s going on. The leading theory? A massive hack. As background, 4chan is a controversial, anonymous message board that’s been online since 2003. […]

What are the security risks of DeepSeek?
The Chinese firm DeepSeek has officially entered the AI arena. When the company released its latest iteration in January of this year, it reached 16 million downloads in just 18 days—nearly double the 9 million downloads achieved by OpenAI’s ChatGPT at launch. Chances are, DeepSeek is already being used in your workplace, quietly boosting employee […]

How to build a human firewall in the cloud
As more organizations embrace cloud applications like Google Workspace and Microsoft 365, the security risks are escalating. In fact, 4 out of 5 companies have fallen victim to a cloud security breach in the last 18 months. While it’s easy to blame the cloud itself, the reality is more complex: these breaches are not typically […]