TrollEye Security

Sullivan Rozar

Jaguar Land Rover Cyberattack Drives Over $220 Million in Losses

Outage Triggers Government Intervention and Severely Impacts Profitability Jaguar Land Rover (JLR) has disclosed the full financial impact of the major cyberattack that crippled its operations earlier this year, confirming losses of £196 million ($220 million) in the quarter ending September 30th, 2025. The figures were released in the company’s latest financial results and reflect […]

Jaguar Land Rover Cyberattack Drives Over $220 Million in Losses Read More »

Five Best Practices for Strong API Security

Strengthening the Backbone of Modern Applications APIs have become the backbone of modern digital ecosystems and development practices, connecting everything from customer portals and mobile apps to payment systems and healthcare platforms. But as organizations continue to build and innovate, APIs have become one of the most frequently targeted points of attack, with nearly every

Five Best Practices for Strong API Security Read More »

AI-Generated “Slop” Ransomware Infiltrates VS Code Marketplace

AI-Generated Ransomware Discovered on Microsoft’s VS Code Marketplace A Visual Studio Code extension with ransomware-like behavior, apparently generated using artificial intelligence, was recently discovered on Microsoft’s official marketplace. The extension, named “susvsex” and published by a user calling themselves “suspublisher18,” openly advertised its ability to steal and encrypt files in its public description. Security researcher

AI-Generated “Slop” Ransomware Infiltrates VS Code Marketplace Read More »

Understanding Software Composition Analysis (SCA)

Integrating Software Composition Analysis (SCA) into a Secure Development Lifecycle Every modern application depends on open-source and third-party components. They speed up development, reduce costs, and provide access to proven functionality, but they also introduce risks that many teams struggle to see.  Software Composition Analysis (SCA) helps solve that problem. It identifies and inventories all

Understanding Software Composition Analysis (SCA) Read More »

Hacktivists Breach Canadian Water and Energy Facilities

Exposed Industrial Systems Highlight Risks to Canada’s Critical Infrastructure In a new alert, the Canadian Centre for Cyber Security confirmed that hacktivists successfully breached multiple critical infrastructure environments, including water treatment, oil and gas, and agricultural facilities, by exploiting internet-facing Industrial Control Systems (ICS). The incidents, first reported by Bleeping Computer, involved attackers targeting operational

Hacktivists Breach Canadian Water and Energy Facilities Read More »

Five Best Practices to Address Security Debt Effectively

Practical Strategies to Reduce Vulnerability Backlogs and Improve Resilience Every organization accumulates a form of technical baggage over time, unpatched systems, deferred fixes, and unresolved findings that quietly build up until they become a real problem. In cybersecurity, this is known as security debt, and it’s one of the most persistent risks enterprises face today.

Five Best Practices to Address Security Debt Effectively Read More »

Cyberattacks on Federal Workers Surge 85% Amid U.S. Government Shutdown

Cyberattacks Nearly Double During Government Shutdown Since the government shutdown began on October 1st, cyberattacks targeting U.S. federal employees have surged 85%, according to data from The Media Trust, first reported by Dark Reading. With critical agencies paused, workers furloughed, and essential personnel continuing without pay, threat actors are taking full advantage of an unprecedented

Cyberattacks on Federal Workers Surge 85% Amid U.S. Government Shutdown Read More »

How to Avoid Shadow IT & Attack Surface Creep

A Guide to Reclaiming Control Over Your Entire Attack Surface Most organizations think they understand their attack surface until a breach reveals assets they didn’t know existed. Shadow IT, the silent expansion of tools and services outside official approval channels, has become one of the leading drivers of attack surface creep. From cloud instances spun

How to Avoid Shadow IT & Attack Surface Creep Read More »

Global AWS Outage Disrupts Major Online Services Across Industries

When AWS Fails, the Internet Follows A widespread outage at Amazon Web Services (AWS) early Monday morning caused significant disruptions across the internet, temporarily disabling major platforms including Fortnite, Snapchat, Alexa, and several financial and enterprise services worldwide. The incident began around 3:11 a.m. ET, when AWS reported increased error rates and latency in its

Global AWS Outage Disrupts Major Online Services Across Industries Read More »

Are Bug Bounty Programs Still an Effective Way to Scale Testing?

Where Bug Bounties Deliver Value vs Where They Become a Resource Drain For years, bug bounty programs have offered an attractive proposition: open your environment to a global network of independent researchers, reward valid findings, and strengthen your defenses through collective intelligence. It’s a model that’s helped thousands of organizations uncover vulnerabilities their internal teams

Are Bug Bounty Programs Still an Effective Way to Scale Testing? Read More »

This Content Is Gated