Skip to content

Third Party Risk

Find below interesting blogs on third party risk management

Weekly Cybersecurity Intelligence Report Cyber Threats & Breaches: July 09-16, 2025

During the week under review, threat actors shifted from high-noise ransomware campaigns to quieter, precision intrusions abusing zero-day or recently patched vulnerabilities and abusing trusted cloud or software-supply-chain services. Fortinet’s FortiWeb, Citrix NetScaler ADC/Gateway and Wing FTP Server all saw in-the-wild exploits within 72 hours of public disclosure—highlighting the narrowing window between a patch release… Read More »Weekly Cybersecurity Intelligence Report Cyber Threats & Breaches: July 09-16, 2025

Weekly Cybersecurity Intelligence Report Cyber Threats & Breaches: July 02-09, 2025

Between July 2 and July 10, 2025, the cybersecurity landscape was marked by high-impact ransomware attacks, critical vulnerabilities in widely used platforms, and advanced persistent threat (APT) campaigns targeting government and enterprise sectors. This report provides an authoritative, technically exhaustive breakdown of each incident, strictly covering only those breaches and attacks that occurred within this… Read More »Weekly Cybersecurity Intelligence Report Cyber Threats & Breaches: July 02-09, 2025

Weekly Report: New Hacking Techniques and Critical CVEs: June 24-30, 2025

The final week of June 2025 witnessed an unprecedented escalation in sophisticated cyber warfare, with critical infrastructure bearing the brunt of state-sponsored espionage campaigns and financially motivated ransomware operations. This period was marked by the convergence of traditional cybercrime tactics with cutting-edge AI-powered attack vectors, presenting a complex threat landscape that challenges conventional security paradigms.… Read More »Weekly Report: New Hacking Techniques and Critical CVEs: June 24-30, 2025

GenAi Risks Firecompass and CISO

Generative AI Risks & Impact On CISOs and Their Teams

Generative AI can be used in a variety of applications, including image and speech recognition, natural language processing, and cybersecurity. In the context of cybersecurity, generative AI can be used to learn from existing data or simulation agents and then generate new artifacts. For example, generative cybersecurity AI can be used to develop secure application… Read More »Generative AI Risks & Impact On CISOs and Their Teams