Attacks, Threats, and Vulnerabilities
Punycode Attack: How It Works? Tips to Prevent, Real-World Examples (Abnormal) Explore how threat actors exploit Punycode in email attacks and learn how AI-driven solutions can protect against these threats.
The Insider Threat Digital Recruitment Marketplace (Nisos) Insider threat digital recruitment is on the rise across cloud apps & dark web. Learn how to stay ahead and protect your organization.
Security Patches, Mitigations, and Software Updates
159-CVE January Patch Tuesday smashes single-month record (Sophos News) Brace yourselves… and consider reading your email in plaintext for now
Trends
2025 Cloud Security Trends: Navigate the Multi-Cloud Maze (Fortinet) Uncover the security challenges and successes that your peers are experiencing in hybrid and multi-cloud landscapes.
Global Risks Report 2025: Conflict, Environment and Disinformation Top Threats (World Economic Forum) State-based armed conflict emerges as the top immediate risk for 2025, identified by nearly a quarter of respondents, reflecting heightened geopolitical tensions and fragmentation globally.
How Initial Access and Ransomware Deployment Trends are Shifting in 2025 (eSentire) Download our 2024 threat recap and 2025 threat landscape outlook report to help you reduce your cyber risks, build resilience, and prevent business…
The AI Gap: New Survey Reveals Enterprises Are Lagging in the High-Stakes AI Adoption Race (Accesswire) Nearly 40% of Employees Say Their Organization Is Falling Behind Competitors Due to Slow Adoption
Black Duck's BSIMM15 Report Highlights How Companies Are Tackling Security Risk in AI and Software Supply Chains (Black Duck Newsroom ) Key BSIMM15 Highlights: The number of organizations conducting adversarial tests (abuse cases) has doubled year-over-year. The number of organizations performing software composition analysis...
IANS Research and Artico Search Unveil State of the CISO 2025 Report (PR Newswire) /PRNewswire/ -- Today, IANS Research and Artico Search released their State of the CISO 2025 Report, an annual research study providing deep insights into the...
Navigating Workplace Security: Red Team Insights for the Return to Office (Bishop Fox) Review how Red Team insights can shed light on gaps in physical security and play a pivotal role in enhancing workplace security for the return to office.
Marketplace
Cork Protection Secures Strategic Investment from Top Down Ventures Through Founders Fund I (EIN Presswire) Cork Protection, a leader in proactive cybersecurity solutions and financial risk management announced a strategic growth investment from Top Down Ventures.
Orchid Security Raises $36 Million Seed Funding to Bring Clarity to the Complexity of Fragmented Identity Security With LLMs (Orchid Security) Backed by Team8, Intel Capital, and Jeff Williams, Orchid Security enables enterprises to achieve continuous visibility, consistent management, and control of their ever-changing identity environment.
Qlik Acquires Upsolver to Deliver Low-Latency Ingestion and Optimization for Apache Iceberg (Qlik) The acquisition expands Qlik’s end-to-end Data Integration platform for open lakehouses, delivering real-time data, optimization, and cost savings
Synthesia secures $180M in Series D funding to advance AI video for enterprise communications (Synthesia) Series D round led by NEA with participation from new investors WiL, Atlassian Ventures, PSP Growth and existing investors, including GV, MMC Ventures and FirstMark. Funding will support product innovation, talent growth, and the company’s expansion in North America, Europe, Japan and Australia.
FusionAuth Rings in 100% Revenue Growth at the Beginning of 2025 (EIN Presswire) Fueled by strong demand for downloadable, dev-first Customer Access and Identity Management (CIAM)
BforeAI Secures Series B Funding to Preempt Malicious Attacks Through PreCrime™ AI - BforeAI (BforeAI) Funded by Titanium Ventures, investment will accelerate growth into new markets.
Thrive Receives Strategic Investment from Berkshire Partners and Court Square Capital Partners (Thrive) Investment will unlock further growth, enhancing Thrive’s position as an industry-leading NextGen MSP/MSSP
Coro Accelerates Growth With EMEA Expansion (Coro Cybersecurity) Building on a strong US performance, the firm is launching advanced cybersecurity solutions at an affordable cost worldwide.
ExtraHop® Celebrates Banner Year, Welcomes New CEO to Lead Next Phase of Growth (ExtraHop) ExtraHop Celebrates Banner Year, Welcomes New CEO to Lead Next Phase of Growth
Products, Services, and Solutions
Sweet Security Introduces Patent-Pending LLM-Powered Detection Engine, Reducing Cloud Detection Noise to 0.04% (GlobeNewswire News Room) TEL AVIV, Israel, Jan. 15, 2025 (GLOBE NEWSWIRE) -- Sweet Security, a leader in cloud runtime detection and response, today announced the launch of its...
Orca Security Unveils Orca Sensor, Extending Cloud Detection and Response with Integrated Runtime Visibility (Orca Security) Based on non-intrusive observability technology, Orca Sensor extends agentless-first approach, providing comprehensive protection for cloud-native applications
CyberArk Integration with Microsoft Defender for Identity Speeds Identification and Containment of Cyber Threats (CyberArk) NEWTON, Mass. & PETACH TIKVA, Israel – January 15, 2024 – CyberArk (NASDAQ: CYBR) today announced a new integration between CyberArk Privileged Access Manager (PAM) and Microsoft Defender for Identity, giving organizations a unified, comprehensive view of their...
Cisco Unveils AI Defense to Secure the AI Transformation of Enterprises (Cisco) Cisco AI Defense is purpose-built for enterprises to develop, deploy and secure AI applications with confidence.
BlackFog and Carahsoft Partner to Enhance Ransomware Protection in the Public Sector (BusinessWire) Powerful AI-Based Cybersecurity Solution Now Available to Government Agencies
WanAware Launches Next-Gen Intelligent Observability Platform to Redefine IT Infrastructure Management (Accesswire) The company is addressing the critical gaps left by legacy IT tools, transforming raw data into actionable insights to overcome cybersecurity risks, inefficiencies, and performance challenges.
Open-source Ranking Algorithm Tool: raink - Sorting Data with LLMs (Bishop Fox) Learn how Bishop Fox's open-source ranking algorithm, raink, can be used to solve general ranking problems that are difficult for LLMs to process.
Academia
Vectra AI Scholars Program (Vectra AI) Vectra AI is proud to introduce the AI Scholars Program, a scholarship opportunity for college and graduate students with groundbreaking ideas for leveraging artificial intelligence (AI) in cybersecurity.