It’s Always DNS: Lessons from the AWS Outage
In episode 404 (no pun intended!) we discuss the recurring issue of DNS outages, the recent Amazon AWS disruption,...
In episode 404 (no pun intended!) we discuss the recurring issue of DNS outages, the recent Amazon AWS disruption,...
Hidden in Plain Sight: How we followed one malicious extension to uncover a multi-extension campaign Short read for everyone:...
PARIS, Oct. 24, 2025, CyberNewswire — Arsen, the cybersecurity company dedicated to helping organizations defend against social engineering, today...
How Can Organizations Ensure Assured Security with Enhanced Non-Human Identities? Maintaining assured security requires more than just safeguarding human...
Are Your Cyber Risk Management Strategies Truly Effective? A growing concern among security professionals is whether they have implemented...
How Can Organizations Improve Their Approach to Cloud Risk Management? Where cloud adoption continues to surge, how can organizations...
Developing Cybersecurity Leaders Through Continuous Learning: Building Skills for a Rapidly Evolving Threat Landscape Guest post by Anne Fernandez Being...
Paris, France, October 24th, 2025, CyberNewsWire Arsen, the cybersecurity company dedicated to helping organizations defend against social engineering, today...
Every network engineer knows the refrain: “It’s always DNS.” When websites won’t load, applications fail to connect, or mysterious...
Alan sits down with Himanshu Kathpal to discuss how modern cybersecurity teams are evolving from reactive defense to proactive...
Alan catches up with Eran Livne, senior director of endpoint remediation at Qualys, to discuss how organizations are evolving...
Organizations rushing to deploy AI agents and scale cloud native infrastructures are hitting an unexpected bottleneck: the complexity of...
Democrats in Congress continue to try to pressure Trump Administration officials to stop cutting or reassigning the workforce of...
Cybersecurity researchers have shed light on a cybercriminal group called Jingle Thief that has been observed targeting cloud environments associated...
In cybersecurity, success is invisible. When nothing breaks, no headlines flash across screens, and no angry calls come from...