News
Entertainment
Science & Technology
Sport
Business & Money
Life
Culture & Art
Hobbies
8 | Follower
UpGuard Blog
17.09.2025
Learn about the Shai-Hulud worm, a self-replicating malware targeting the NPM ecosystem that steals developer credentials and exposes them.
Tired of fighting fires? Learn how UpGuard’s CRPM platform, powered by the GRID and 1+1>2 effect, helps you control your security posture proactively.
10.09.2025
Move away from point solutions to a unified defense of your security posture with UpGuard’s CRPM platform. Read more to learn how.
05.09.2025
Too many tools will leave you with too many costs. Learn why a fragmented defense line is an expensive decision you cannot afford to have and how to fight
04.09.2025
Cut through the noise of constant security alerts to proactively identify and mitigate urgent breach risks before they escalate with threat monitoring.
A deep dive into the Salesloft Drift breach. Learn how this supply chain attack used stolen OAuth tokens to target Salesforce and how to respond.
A recap of all the major announcements and product updates at UpGuard Summit, Q3 2025.
03.09.2025
An outdated firewall isn’t your only weak point. Learn why traditional security is failing against modern attacks and what’s needed for a way forward.
02.09.2025
Learn how cyber threat monitoring is evolving in 2025 and what tools, tactics, and best practices your security team needs to stay ahead.
01.08.2025
Discover what shadow SaaS is, the risks it poses, and how to detect, manage, and integrate it into your third-party risk management strategy.
11.07.2025
Learn what doxing is and how you can protect yourself from being humiliated on the internet.
09.07.2025
CVE-2016-10045 is still rearing its ugly head in 2025. Learn how to detect and shut down this risk.
01.07.2025
A CASB (cloud access security broker) is an intermediary between users, an organization, and a cloud environment. Learn more.
26.06.2025
SIEM delivers next-generation cybersecurity functionality for businesses in real-time, covering the key challenges of modern cybersecurity. Learn more.
Learn about the dangers of typosquatting and what your business can do to protect itself from this malicious threat.
Find out why you need MFA to secure your accounts and prevent data breaches.
Two-factor authentication (2FA) is used to verify users’ identities and provide an additional layer of account security. Learn more.
Learn the different types of identity theft and how to protect yourself from becoming a victim.
25.06.2025
AI is increasing the speed and magnitude of domain-based attacks. Learn why DNS security must become a top priority for CISOs over the next three years.
The largest breach in the history of the internet exposed 16 billion logins. Key lessons and how to ensure the security of your corporate credentials.
Cloud Security Posture Management (CSPM) is a category of cybersecurity tools that enhance cloud data security. Learn how they secure cloud environments.
Business email compromise (BEC) occurs when cybercriminals scam organizations of sensitive data via email. Learn prevention technqiues.
19.06.2025
Is your security awareness training failing to stop modern threats? Learn why traditional methods fail and how to build a stronger human risk strategy.
17.06.2025
Asana identified a bug in its Model Context Protocol (MCP) server that may have exposed data to MCP users in other Asana accounts.
12.06.2025
Blanket bans on SaaS and AI tools rarely work as intended—explore better risk-based strategies for secure adoption while preventing shadow IT risks.
One third of exposed instances discovered by UpGuard Research are lacking authentication. Learn how they can put your AI stack at risk.
11.06.2025
Discover how third party security safeguards your vendor relationships and ensures compliance. Build a proactive risk program now.
TPCRM fosters digital trust in modern ecosystems. Learn how to manage vendor risks, secure data, and ensure compliance in one framework.
Vendor security review is critical for safeguarding data. Discover key components and actionable steps to evaluate vendors effectively.
05.06.2025
Uncover the hidden risks of unapproved AI tools in your organization. Learn to detect, manage, and secure sensitive data from shadow AI threats.
UpGuard Research surveyed accessible LlamaIndex chatbots to understand the real-world risks–including one instance leaking PII.
29.05.2025
Explore the security risks of unchecked permission management and get actionable strategies for visibility and control.
26.05.2025
Traditional TPRM is struggling as vendor breaches hit 47%. Uncover insights from the 2025 Ponemon Report to learn how you can future-proof your TPRM.
22.05.2025
Generative AI servers are leaking images, workflows, and prompts. Are they creating risk in your AI supply chain?
Fight brand impersonation and online fraud. Learn key strategies to protect your digital presence & reputation in today's cyber threat landscape.
15.05.2025
Context-aware emails, deepfake voice impersonation—AI is rapidly evolving phishing. Discover these new threats and the critical defenses you need now.
08.05.2025
Turn audit failures into stronger security—explore practical steps for assessment, remediation planning, validation, and continuous risk monitoring.
01.05.2025
RaaS turns ransomware into a scalable business. Learn more about the ecosystem, key players, and crucial defense strategies for security leaders.
24.04.2025
Is your team unknowingly leaking sensitive data through its AI usage? Discover the dangers of Shadow AI and strategies for secure AI adoption at work.
17.04.2025
Analyzing privacy policies can tell us which companies are using AI and training their models with your data.