Author: Maggie MacAlpine

Insiders, Enhanced: How Generative AI is Changing the Threat Landscape

Insiders, Enhanced: How Generative AI is Changing the Threat Landscape

As artificial intelligence becomes more accessible, a new wave of cybersecurity risk is rising from within: insider threats enhanced by generative AI. According to a recent TechRadar report, security professionals are now more concerned about insider threats than external attackers, driven in part by the increasing use of generative AI tools. While external threats like

Read More
Drowning in Alerts: Why Cybersecurity Teams Are Struggling—and What Needs to Change

Drowning in Alerts: Why Cybersecurity Teams Are Struggling—and What Needs to Change

Security teams are under siege—not just from attackers, but from the very tools meant to protect them. A new report by TechTarget’s Enterprise Strategy Group and Opal Security reveals a growing crisis: identity-related alerts are flooding SOCs with over 11 hours of investigation time per incident on average, often with no meaningful action taken. For

Read More
When Trusted Apps Become Threat Vectors: Salesforce OAuth Breach Explained

When Trusted Apps Become Threat Vectors: Salesforce OAuth Breach Explained

Based on reporting from Cybersecurity Dive, August 21, 2025. In a newly disclosed campaign attributed to threat actor UNC6395, multiple Salesforce instances were breached through the compromise of OAuth tokens used by a third-party app, Drift. The attackers exploited these trusted tokens to harvest sensitive data from connected environments—including passwords, AWS keys, and Snowflake credentials—without

Read More
Malware Delivery Shifts: Malicious URLs Surpass Attachments as Top Threat Vector

Malware Delivery Shifts: Malicious URLs Surpass Attachments as Top Threat Vector

Cyber attackers have changed their tactics. According to a recent ITPro report, malicious URLs are now four times more common than infected email attachments when it comes to delivering malware. This shift has serious implications for defenders, especially as phishing techniques evolve to exploit trust and emerging communication channels. The Rise of Link-Based Attacks In

Read More

Categories

Seceon Inc