TrollEye Security

Sullivan Rozar

Discord Refuses to Pay Hackers Behind Alleged 5.5 Million-User Breach

Discord Rejects Extortion Demand Discord is refusing to pay ransom to threat actors who claim to have stolen data belonging to 5.5 million users from the company’s Zendesk support system, as reported by BleepingComputer. The attackers allege that the breach exposed government IDs, partial payment information, and other sensitive details linked to millions of support […]

Discord Refuses to Pay Hackers Behind Alleged 5.5 Million-User Breach Read More »

What Is Privileged Access Management (PAM)? A Complete Overview for Modern Enterprises

How to Pick the Right PAM Solution for Your Organization and Deploy it Effectively Privileged Access Management (PAM) sits at the center of identity security. It governs the most powerful credentials in your environment, the ones that can reconfigure infrastructure, exfiltrate sensitive data, or disable defenses entirely. Done right, PAM closes the gap between identity

What Is Privileged Access Management (PAM)? A Complete Overview for Modern Enterprises Read More »

TrollEye Security Named as a Representative Provider in a Recent Gartner® Report

TrollEye Security Named as a Representative Provider in the 2025 Gartner® Innovation Insight: Penetration Testing as a Service Report We are happy to announce that, as of October 3rd, 2025, TrollEye Security has been identified as a Representative Provider in the recent Gartner report, Innovation Insight: Penetration Testing as a Service (PTaaS). According to the

TrollEye Security Named as a Representative Provider in a Recent Gartner® Report Read More »

ShinyHunters Launches Salesforce Data Leak Site Targeting 39 Companies

ShinyHunters Target 39 Global Brands in Massive Extortion Campaign A notorious cyber extortion group has launched a data leak site to publicly pressure dozens of companies compromised in a recent wave of Salesforce breaches, according to BleepingComputer. The site lists 39 alleged victims, including major brands such as FedEx, Disney, Marriott, Google, Cisco, Toyota, and

ShinyHunters Launches Salesforce Data Leak Site Targeting 39 Companies Read More »

IDS and IPS; Choosing the Right Tools for Your Maturity

Understanding IDS vs. IPS and Avoiding Security Stack Bloat Cyberattacks move fast. In 2024, the average Time-to-Exploit (TTE) dropped to just five days, leaving security teams no time to waste on false positives or redundant tools. What they need are defenses that stop real threats without adding more complexity to an already overloaded stack. Intrusion

IDS and IPS; Choosing the Right Tools for Your Maturity Read More »

Brickstorm Malware Used to Steal U.S. Orgs’ Data for Over a Year

Google Ties Brickstorm Malware to Espionage on U.S. Tech and Legal Firms Suspected Chinese hackers have used a stealthy malware known as Brickstorm to spy on U.S. organizations for more than a year, according to Google’s Threat Intelligence Group (GTIG), as first reported by Bleeping Computer. The malware was deployed in long-term persistence operations targeting

Brickstorm Malware Used to Steal U.S. Orgs’ Data for Over a Year Read More »

How to Implement an Effective AI Governance Policy

A Practical Framework for Responsible, Secure, and Transparent AI Use Artificial intelligence has rapidly become embedded in cybersecurity, powering threat detection systems, automating incident response, and enabling predictive analytics to anticipate attacks. The benefits are significant, with studies showing an average $1.9 million reduction in breach costs for organizations using AI effectively. But the same

How to Implement an Effective AI Governance Policy Read More »

Massive Android Ad Fraud Operation “SlopAds” Disrupted After Generating 2.3 Billion Daily Ad Requests

224 Malicious Apps Pulled from Google Play After 38 Million Downloads Worldwide A massive Android ad fraud campaign known as “SlopAds” has been dismantled after investigators uncovered 224 malicious applications on Google Play generating more than 2.3 billion ad requests each day. The operation, uncovered by HUMAN’s Satori Threat Intelligence team and reported by BleepingComputer, involved

Massive Android Ad Fraud Operation “SlopAds” Disrupted After Generating 2.3 Billion Daily Ad Requests Read More »

SIEM vs SOAR vs XDR vs EDR; What’s the Difference and How to Use Each Effectively

How Each of These Solutions Fits Into Modern Security Operations The security technology landscape is full of acronyms that often get used interchangeably, but each represents a distinct approach to threat detection and response. SIEM, SOAR, XDR, and EDR all play important roles in modern security programs, yet they are designed to solve different problems.

SIEM vs SOAR vs XDR vs EDR; What’s the Difference and How to Use Each Effectively Read More »

Largest NPM Supply-Chain Compromise in History Nets Attackers Around $600

NPM Supply-Chain Compromise Hits 10% of Cloud Environments, While Attackers Net Just $600 The open-source software community was rocked this week by what researchers are calling the largest supply-chain compromise in the history of the NPM ecosystem, first reported by Bleeping Computer. The attack briefly infiltrated some of the most widely used JavaScript libraries, impacting

Largest NPM Supply-Chain Compromise in History Nets Attackers Around $600 Read More »

This Content Is Gated