Modern Terms and Concepts for a Zero Trust Mindset

When Zero Trust was first coined by John Kindervag in 2009, it challenged the “trust but verify” approach of traditional security models. At the time, Zero Trust required us to challenge the assumption that trust is implicit. Especially with the complex networks, systems, and services that we see in today’s vast digital supply chain, trust […]

Announcing Windows 11 Insider Preview Build 22635.4000 (Beta Channel)

Hello Windows Insiders, today we are releasing Windows 11 Insider Preview Build 22635.4000 (KB5040546) to the Beta Channel. REMINDER: Windows Insiders in the Beta Channel will receive updates based on Windows 11, version 23H2 via an enablement package (Build 22635.xxxx). For Insiders in the Beta Channel who want to be the first to get features gradually […]

Announcing Windows 11 Insider Preview Build 26120.1330 (Dev Channel)

Hello Windows Insiders, today we are releasing Windows 11 Insider Preview Build 26120.1330 (KB5040543) to the Dev Channel. REMINDER: Windows Insiders in the Dev Channel will now receive updates based on Windows 11, version 24H2 via an enablement package (Build 26120.xxxx). For Insiders in the Dev Channel who want to be the first to get features […]

This AI-Powered Cybercrime Service Bundles Phishing Kits with Malicious Android Apps

A Spanish-speaking cybercrime group named GXC Team has been observed bundling phishing kits with malicious Android applications, taking malware-as-a-service (MaaS) offerings to the next level. Singaporean cybersecurity company Group-IB, which has been tracking the e-crime actor since January 2023, described the crimeware solution as a “sophisticated AI-powered phishing-as-a-service platform”

Top 4 Use Cases of Non-Human Identity Security: Live Event Recap

Originally published by Astrix on June 13, 2024.Last week we held an insightful live event featuring our solutions engineer, Michael Silva, and our CISO in Residence, Tim Youngblood. The event focused on the top four non-human identity (NHI) use cases that are crucial for security teams. Here’s a recap of the key points discussed during […]