Monday 10/13
Pure Storage Unveils High-density QLC Flash Advancements (Pure Storage)
A new software-defined architecture from Pure Storage leverages high-density QLC flash and host-based flash management to cost-effectively deliver industry-leading performance density, power, and space efficiency for AI and other hyperscale workloads.
https://blog.purestorage.com/news-events/pure-storage-unveils-high-density-qlc-flash-advancements/
Understanding Indicators of Compromise and Their Role in Cybersecurity (Arctic Wolf)
IOCs are often used to help contextualize otherwise independent pieces of data. They each may not be indicative of a cyber attack, but when pieced together, they paint a clear picture of what’s occurring within an organization’s environment while providing security teams with vital data needed to take appropriate actions.
https://arcticwolf.com/resources/blog/understanding-indicators-of-compromise-and-their-role-in-cybersecurity/
Tuesday 10/14
Cybersecurity Awareness Month: Machines Are Identities Too (Delinea)
As AI agents and workloads take on more autonomous tasks, they inherit many of the same risks as traditional machine identities, but at a greater scale and speed. AI-driven processes often require broad access to sensitive data and APIs, making excessive permissions a critical concern.
https://delinea.com/blog/cybersecurity-awareness-month-machine-identities
Wednesday 10/15
Why "Assume Breach" is the Only Way Forward (Rubrik)
While organizations poured billions into building stronger, higher walls, attackers simply became better at finding ways in. The more innovative approach has always been to assume they're already inside and build systems that can withstand and rapidly recover from that reality.
https://www.rubrik.com/blog/company/25/why-assume-breach-is-the-only-way-forward
Windows 10 End of Support: How to Stay Protected (CrowdStrike)
As of October 14, 2025, Microsoft has officially ended support for non-LTSC releases of Windows 10, concluding one of the most widely adopted operating systems in history. From this point forward, the operating system will no longer receive security updates or feature patches by default.
https://www.crowdstrike.com/en-us/blog/windows-10-end-of-support-how-to-stay-protected/
Global Cyber Threats September 2025: Attack Volumes Ease Slightly, but GenAI Risks Intensify as Ransomware Surges 46% (Check Point)
The global cyber threat landscape reflected a temporary stabilization in overall attack volumes — yet beneath the surface, ransomware activity and data risks linked to generative AI (GenAI) surged to new highs. Organizations worldwide faced an average of 1,900 cyber-attacks per organization per week, representing a 4% decrease compared to August, but still a 1% increase year-over-year.
https://blog.checkpoint.com/security/global-cyber-threats-september-2025-attack-volumes-ease-slightly-but-genai-risks-intensify-as-ransomware-surges-46/
Thursday 10/16
HYPR Delivers the First True Enterprise Passkey for Microsoft Entra ID (HYPR)
Empower your employees with fast, frictionless access that works everywhere they do. And empower your security team with the control and assurance that only a true enterprise passkey can provide
https://blog.hypr.com/enterprise-passkey-for-microsoft-entra-id
Introducing HoneyBee: How We Automate Honeypot Deployment for Threat Research (Wiz)
HoneyBee takes popular cloud-deployed applications such as databases, storage services, and web apps, and automatically generates intentionally insecure Dockerfiles and Docker Compose manifests. These are designed to mimic the types of mistakes we see in real environments, from overly permissive authentication settings to insecure storage bucket configurations.
https://www.wiz.io/blog/honeybee-threat-research
Friday 10/17
The hidden risk of Microsoft Direct Send: why you need a secure email relay (Proofpoint)
Microsoft Direct Send was designed for convenience, but convenience is no longer enough. Attackers now exploit Direct Send to impersonate your domains and bypass trust. For enterprises running Microsoft 365, Proofpoint Secure Email Relay provides the authenticated, compliant, and threat-protected path for application and device-generated mail.
https://www.proofpoint.com/us/blog/email-and-cloud-threats/microsoft-direct-send-risks-need-for-secure-email-relay
Stop the Silent Spread with Unified ZTNA (Cato Networks)
Once an attacker compromises a single endpoint, the focus quickly shifts to expanding reach, moving laterally, elevating privileges, and staging data theft. If access controls are inconsistent or overly permissive, this becomes easy. This stage, when attackers quietly expand their footprint, is often overlooked.
https://www.catonetworks.com/blog/stop-the-silent-spread-with-unified-ztna/