The best picks of the industry and team updates

An exclusive series authored by ZENDATA’s experts, featuring technical deep dives, the latest threat trends, articles on penetration testing, operational technology (OT), incident response (IR), managed detection and response (MDR), and more.

Discord ID card breach

When Customer Support Becomes the Weakest Link: Lessons from the Discord Breach

How Businesses Can Protect Themselves From MatrixPDF Attacks

MatrixPDF Puts Gmail Users at Risk with Malicious PDF Attachments

Swiss e-ID and UAE Pass

Swiss e-ID vs UAE Pass: managing digital government identity

FBI Warns of Salesforce Data Theft | What was stolen | ZENDATA

FBI Warns of Salesforce Data Theft

What is Oyster Malware in 2025 | Cyberattack Threats | ZENDATA

What is Oyster Malware and Threat Actors Breaking to Enterprise Infrastructure Within 18 Minutes

Backup systems are a target for ransomware | ZENDATA Security

Google’s Security Chief warns backup systems are a target for ransomware

Jaguar Land Rover Cyberattack | ZENDATA Cybersecurity

Jaguar Land Rover Production Halt Extended After Cyberattack

Ransomware lead to gold heist

When Cybercrime Switches Off the Alarms

Illustration of a futuristic AI agent surrounded by digital emails, with one malicious message leaking data into dark shadows, symbolizing cybersecurity risks of AI agents.

Weak Cybersecurity Foundations Turn AI Agents into Attack Vectors

ZENDATA is looking for partnerships to join forces and provide your and our clients with the best solutions available on the market. If you want to become a partner, let's meet up!