Press Releases

Forescout

Sandworm Not All to Blame: Forescout Research Uncovers New Evidence Tied to Energy Sector Cyberattacks in Denmark

SAN JOSE, Calif., January 11, 2024 – Forescout, today unveiled “Clearing the Fog of War,” a report that introduces fresh evidence regarding two previously documented attacks that affected the Danish energy sector in May 2023. Forescout Research – Vedere Labs conducted an independent analysis of these attacks and discovered a …

Delinea

Delinea acquires Authomize to detect and mitigate identity threats

Today, Delinea announced that we have acquired Authomize, an innovator in detecting and eliminating identity-based threats across SaaS, cloud, and traditional systems. Authomize offers visibility beyond the boundaries of the firewall to understand connections in the SaaS and cloud world. Today, their solution identifies threats across all identities and empowers …

SealPath

ONNERA Group strengthens data security with SealPath

BILBAO, SPAIN OCTOBER 6, 2023 – The collaboration with SealPath has resulted in a seamless integration of advanced security measures into Onnera’s document management systems, providing the company with total control of its documents. Onnera Group, an international business group specializing in equipment solutions for hospitality, laundry and refrigeration applications …

Exclusive Networks

Exclusive Networks signs a binding agreement to acquire Ingecom

Further expanding Ignition Technology in EMEA Boulogne-Billancourt, on September 12th, 2023, at 07:00 A.M. CET – Exclusive Networks (Euronext Paris: EXN), a global leader in cybersecurity, announced today that it has signed an agreement to acquire Ingecom, a Value Added Distributor (VAD) 100% specialized in cybersecurity and cyber intelligence solutions …

Cymulate

Cymulate Announces Security Analytics for Continuous Threat Exposure Management

Cymulate, the leader in exposure management and security validation, today announced the release of a ground-breaking new solution for organizations to run an informed continuous threat exposure management (CTEM) program. The CTEM program, which was coined by Gartner, Inc. is designed to diagnose the severity of exposures, create an action …

Cymulate

Cymulate is committed to risk exposure management

The company closes the risk gaps between vulnerability scanning and attack surface management across the hybrid infrastructure. New York – April 12, 2023 – Cymulate, a leader in cybersecurity risk exposure management and validation, announces the expansion of its Attack Surface Management (ASM) solution to close the gaps between traditional …

LATEST BLOGS

Blog CymulateTest LLM Resilience Against Prompt Injection and Jailbreaks with New Cymulate Attack Scenarios

Test LLM Resilience Against Prompt Injection and Jailbreaks with New Cymulate Attack Scenarios

As large language models (LLMs) become embedded in productivity, automation and security workflows, a new class of risks has emerged—prompt injection and jailbreaks that can silently override system instructions. Cymulate now gives security teams the automation and expertise to test and validate LLMs against these threats to the technology that drives artificial intelligence applications.  …
Read more
Caso de éxito SealPath 2025

Operbus Ensures the Confidentiality of Its CAD Designs and Collaboration with SealPath

“We wanted to guarantee the confidentiality of our designs: all technical documents, all contracts… The goal was to maintain a collaborative environment but in a secure way, and to have more than just a tool — to have a technological ally.” – David Eduardo Magaña, CIO at Operbus. Operbus is …
Read more
Txone

We Need to Align Cybersecurity with Business in the Industrial Environment

Cybersecurity in industrial environments can no longer be viewed as an isolated domain. Protecting Operational Technology (OT) depends on a solid IT foundation that aligns technical defences with business objectives. Only through this integration can organisations ensure operational continuity, safety, and resilience against cyber threats. Today, we understand that OT …
Read more