Author: Media Fuse LTD

  • Zeni Launches AI-Powered Treasury Solution

    Zeni Launches AI-Powered Treasury Solution

    Zeni Launches AI-Powered Treasury Solution

    PR Newswire

    PALO ALTO, Calif., Jan. 15, 2026 /PRNewswire/ — Zeni, the leading AI-powered bookkeeping platform for startups and growing businesses, today announced the launch of Zeni Treasury, a new cash management solution designed to help businesses manage idle capital while maintaining liquidity and operational flexibility.

    Zeni Treasury allows businesses to earn competitive, market-leading yields on cash reserves, significantly outperforming traditional business checking and savings accounts, with zero minimums, no lockup periods, and instant access to funds. The product seamlessly integrates with Zeni’s AI-powered bookkeeping and finance management platform, giving businesses a unified view of all financial operations.

    “Every dollar sitting idle in a checking account represents a missed opportunity,” said Snehal Shinde, CPO and Cofounder at Zeni. “Zeni Treasury was built to solve a fundamental problem for modern businesses: how to maximize returns without sacrificing liquidity or adding complexity. With Treasury, companies can put their cash to work immediately while maintaining the flexibility they need to operate and grow.”

    Key Features and Benefits:

    • Competitive High Yield: Earning optimized returns, helping businesses grow their capital faster than traditional banking products
    • Zero Barriers to Entry: No minimum balance requirements, hidden fees, or high-balance thresholds
    • Complete Liquidity: Instant access to funds with no lockups or withdrawal penalties
    • Safety and Security: Funds invested in diversified money market funds managed by SEC-registered partner Atomic Invest LLC, typically allocating to low-risk instruments including U.S. Treasuries and high-quality commercial paper
    • Seamless Integration: Treasury accounts integrate directly with Zeni’s AI finance platform, providing unified tracking of checking, credit cards, bookkeeping, and cash management in a single dashboard
    • Automated Reconciliation: Zeni’s AI finance team automatically tracks Treasury transactions for effortless reporting and tax preparation

    Unlike traditional business banking products that offer minimal returns or impose restrictive terms, Zeni Treasury combines institutional-grade yields with the accessibility and ease-of-use that modern businesses demand. The product is available to all Zeni customers through their existing dashboard, with new customers able to open accounts in minutes with no paperwork required.

    Zeni Treasury represents the company’s continued commitment to providing comprehensive, AI-driven financial solutions that help businesses optimize every aspect of their financial operations. By integrating high-yield cash management directly into its platform, Zeni eliminates the need for businesses to maintain separate relationships with multiple financial service providers.

    About Zeni

    Zeni is an AI bookkeeping software backed by a dedicated finance team. With a comprehensive suite of financial tools and services, you can leverage automation to save 70 hours per month and increase the accuracy of your financial operations.

    Contact

    VP of Marketing
    Garit Boothe
    Zeni
    ben@zeni.ai

    Photo – https://mma.prnewswire.com/media/2862737/Zeni_Photo.jpg

    Cision View original content to download multimedia:https://www.prnewswire.com/news-releases/zeni-launches-ai-powered-treasury-solution-302662484.html

    SOURCE Zeni

  • Aembit Announces Agenda and Speaker Lineup for NHIcon 2026 on Agentic AI Security

    Aembit Announces Agenda and Speaker Lineup for NHIcon 2026 on Agentic AI Security

    Aembit Announces Agenda and Speaker Lineup for NHIcon 2026 on Agentic AI Security

    PR Newswire

    SILVER SPRING, Md., Jan. 15, 2026 /PRNewswire/ — Aembit today announced the agenda and speaker lineup for NHIcon 2026: The Rise of Agentic AI Security, a virtual conference scheduled for Jan. 27. The second-annual event will examine the technical, operational, and security challenges emerging as agentic artificial intelligence systems enter enterprise environments.

    NHIcon 2026 will feature keynote addresses from Phil Venables, partner at Ballistic Ventures and former chief information security officer (CISO) at Goldman Sachs and Google Cloud; Misam Abbas, staff AI engineer and technical lead for generative AI safety at LinkedIn; and Jason Clinton, deputy CISO at Anthropic.

    The program brings together practitioners from a broad range of enterprise and technology organizations, with speakers representing companies including Pinterest, Dolby, Walmart, Snowflake, IBM, and others actively working with agentic AI.

    NHIcon 2026 is presented by Aembit, with community partnership support from the Cloud Security Alliance and the Identity Defined Security Alliance. Event sponsors are GitGuardian, Silverfort, WitnessAI, and Entro.

    The agenda includes more than 20 practitioner-led sessions reflecting how AI systems are being designed, assessed, deployed, and secured in practice. Topics include large language model evaluation, agent behavior, techniques for controlling secrets usage, platform telemetry and investigative visibility, the OWASP Top 10 for agentic AI, MCP adoption challenges, and the limits of existing frameworks as autonomy increases.

    Clinton of Anthropic will deliver the closing keynote, addressing security considerations associated with “frontier-scale” AI systems, including observations on AI-enabled nation-state activity and the implications of continued model scaling for security operations, engineering practices, and the software development lifecycle. Due to the nature of the material discussed, this session will not be recorded.

    In addition to individual sessions, NHIcon 2026 will feature a cross-industry CISO panel examining how security leaders are establishing guardrails for agentic AI as accountability models shift and standards remain unsettled. Panelists will discuss approaches to risk assessment, responsibility, and enforcement in environments where autonomous systems act

    The program also includes a “Lightning Talk Lunch” featuring six ten-minute presentations of concise instruction and immediately applicable techniques. Live discussion and opportunities for attendee interaction are incorporated throughout the program, including interactive challenges with prizes.

    “Organizations are encountering agentic systems that behave in ways earlier security models did not anticipate,” said David Goldschlag, co-founder and CEO of Aembit. “NHIcon creates a forum for practitioners to compare experience, test assumptions, better understand how these systems change long-standing security expectations, and leave with guidance they can apply directly.”

    Registration for NHIcon 2026 is free and available at NHIcon.com.

    About Aembit

    Aembit is the identity and access management platform for agentic AI and workloads. It enforces access based on identity, context, and centrally managed policies, giving organizations a singular place to control access risk from AI agents, automate credential management, and accelerate AI adoption. With Aembit, enterprises can confidently control access to sensitive resources across all the workloads that power their business. Users can visit aembit.io and follow the company on LinkedIn.

    Contact

    Chief Marketing Officer
    Apurva Davé
    Aembit
    info@aembit.io 

    Image – https://mma.prnewswire.com/media/2862665/Aembit.jpg

    Cision View original content to download multimedia:https://www.prnewswire.com/news-releases/aembit-announces-agenda-and-speaker-lineup-for-nhicon-2026-on-agentic-ai-security-302662421.html

    SOURCE Aembit

  • BitsLab 2025 Audit Annual Summary: 200+ Projects Audited, 2,858 Vulnerabilities Discovered

    BitsLab 2025 Audit Annual Summary: 200+ Projects Audited, 2,858 Vulnerabilities Discovered

    BitsLab 2025 Audit Annual Summary: 200+ Projects Audited, 2,858 Vulnerabilities Discovered

    PR Newswire

    SAN FRANCISCO, Jan. 15, 2026 /PRNewswire/ — 2025 has been a year of rapid evolution for Web3 infrastructure. As a pioneer in AI-driven digital asset security, BitsLab has safeguarded Web3 infrastructure through audits, penetration testing, and continuous security monitoring. To date, they have provided security for 716 million users worldwide and protected over $160 billion in on-chain value.

    With its three specialised brands—MoveBit, ScaleBit, and TonBit—BitsLab demonstrated exceptional security prowess in 2025. The firm not only maintained absolute dominance in Move ecosystems such as Sui and Aptos but also established extensive security deployments across mainstream ecosystems like BSC, Ethereum, Solana, TON, and BTC, as well as emerging L1/L2 sectors including Monad, IOTA, Supra, and CKB, building a comprehensive AI security defence matrix.

    2025 Core Audit Landscape: AI-Driven Multi-Chain Progress & Full Ecosystem Coverage

    In 2025, BitsLab completed 204 audit projects. This achievement not only highlights BitsLab’s deep involvement in mainstream public chains and emerging tracks but also marks BitsLab’s official entry into the ‘AI + Security’ era.

    AI Empowerment: Deep Synergy Between BitsLabAI Scanner and Expert Audits

    During the 204 project audits, BitsLab fully upgraded its audit paradigm by introducing an AI-driven security system centred on the BitsLabAI Scanner. Based on models trained on massive real-world vulnerability data, the AI performs automated, high-coverage risk screening. This is then combined with AI-assisted formal verification and advanced penetration testing, with final deep-dive audits and judgments completed by expert teams. This provides security for projects with a cumulative TVL exceeding $164 billion, evolving auditing from a one-time delivery into an ‘AI + Expert’ collaborative intelligent defence.

    Core Chain Audit Distribution: AI Defence Lines for High-Value Ecosystems.

     Among the 204 projects, major public chains represent the core proportion, reflecting the high recognition of BitsLab’s AI security technology in high-value ecosystems:

    • Move Ecosystem Core (Sui & Aptos): 96 projects audited (74 for Sui, 22 for Aptos), continuing to consolidate absolute dominance in this track.
    • Mainstream EVM Ecosystem (BSC & Ethereum): 43 projects audited (31 for BSC, 12 for Ethereum), utilising BitsLabAI Scanner to effectively handle complex logical risks in EVM.
    • Value-Store Ecosystems (TON & BTC): 12 projects audited (6 for TON, 6 for BTC), extending the AI security boundary to both emerging and classic value chains.

    Extensive Cross-Chain Footprint: One-Stop AI Security Protection Beyond the core chains mentioned above, BitsLab’s AI security reach extends to dozens of other chains, including Solana (4), IOTA (4), EVM Chains (2), CKB (2), Monad (1), DuckChain (1), Starknet (1), and Arbitrum (1). Through the rapid adaptation of the BitsLabAI Scanner, BitsLab achieved efficient security responses in cross-chain environments, truly ‘auditing, monitoring, and defending’ every piece of infrastructure.

    Vulnerability Mining Results: AI Scanning + Expert Review Neutralises 2,858 Security Risks

    Vulnerability Severity Breakdown: Utilised AI-assisted auditing to precisely locate a massive number of critical risks, effectively defending against potential economic attacks:

    • Critical: 101
    • Major: 399
    • Medium: 661
    • Minor/Informational: 1,697

    Key Ecosystem Vulnerability Details: Performance of the AI Defence Line. Through the wide application of the BitsLabAI Scanner, BitsLab achieved significant results across major ecosystems:

    Brand Matrix: A Triple AI Security Barrier

    • MoveBit: The ‘AI Guardian’ of the Move Ecosystem. As the benchmark for Move security, MoveBit uses AI to monitor full-spectrum security across Sui and Aptos, fixing over 1,480 hidden vulnerabilities in 2025.
    • ScaleBit: The AI Bridge Connecting EVM and the Future. ScaleBit successfully applied AI auditing to multi-chain environments, including BSC, Ethereum, Solana, and BTC, ensuring the security of complex cross-chain applications under economic pressure and extreme conditions.
    • TonBit: The Primary Security Assurance Provider for the TON Ecosystem. As a TON official-certified Primary Assurance Security Provider, TonBit focuses on the rapidly growing TON ecosystem. Through AI scanning and attack simulation, it has built an unbreakable security foundation for TON protocols.

    Strategic Upgrade: BitsLab Safe Builds a Full-Scene Anti-Phishing and Anti-Fraud Defense

    In 2025, BitsLab successfully acquired the well-known Japanese security plugin KEKKAI and rebranded it as BitsLab Safe. This move extends BitsLab’s security capabilities from back-end code logic to front-end interaction protection, building a full-spectrum security matrix ‘from code logic to asset interaction.’

    • AI-Driven Real-Time Protection: BitsLab Safe integrates AI transaction simulation and phishing detection to warn of potential risks before a transaction is executed.
    • Empowering Agent Security: As the entry point to the BitsLab intelligent security stack, BitsLab Safe secures payment flows for x402 and AI Agents.

    In 2025, through the precise neutralisation of 2,858 vulnerabilities and the rigorous protection of $160 billion in assets, BitsLab continues to defend the Web3 industry ecosystem. From deep protocol-level audits empowered by BitsLab AI Scanner to the strategic entry into interaction-side anti-phishing and anti-fraud protection with BitsLab Safe has successfully built a comprehensive security matrix ‘from underlying code to terminal interaction, and from protocol logic to asset flow.’

    In the coming era of interconnected chains and the accelerated AI Agent economy, BitsLab will continue to deepen its presence in the multi-chain ecosystem and iterate on AI security technology. With ‘Audit, Monitor, and Defend’ as their core mission, BitsLab defines the new security standards for the Web3 era, ensuring that every bit of value in the decentralised world can circulate freely under the protection of AI and industry experts.

    About BitsLab

    BitsLab is an AI-driven security company focused on digital asset protection. It delivers an integrated solution of ‘audit services + AI security engine + security tools’ for emerging Web3 ecosystems, helping developers and end users build, trade, and interact on-chain with greater safety.

    Within its security framework, BitsLab combines BitsLab AI Scanner and BitsLab Safe to form a complete AI-powered protection system. BitsLab Safe, an AI-based Web3 security product, provides enterprise-grade defence by simulating transactions in real time, detecting scams and malicious contracts, and securing x402 payments and AI Agent operations through BitsLab’s agentic security stack. BitsLab AI Scanner, built on a vulnerability and threat intelligence engine, performs intelligent auditing and risk detection to improve efficiency and reduce false positives.

    BitsLab operates three sub-brands – MoveBit, ScaleBit, and TonBit-serving emerging ecosystems in Web3. The team offers professional audits and vulnerability research to keep core infrastructure secure during rapid iteration. Its researchers have won multiple international CTF awards and discovered critical vulnerabilities in many major ecosystems, driving meaningful improvements in industry-wide security.

    Contact

    Marketing Manager
    Jason Li
    BitsLab
    jasonlee@bitslab.xyz 

    Photo: https://mma.prnewswire.com/media/2862551/BitsLab_Tracker.jpg
    Photo: https://mma.prnewswire.com/media/2862552/BitsLab_Graph.jpg
    Photo: https://mma.prnewswire.com/media/2862553/BitsLab_2025_Audit.jpg

     

    Cision View original content to download multimedia:https://www.prnewswire.com/news-releases/bitslab-2025-audit-annual-summary-200-projects-audited-2-858-vulnerabilities-discovered-302662215.html

    SOURCE BitsLab

  • Qryptonic Launches Q-Scout 26 to Prioritize Post-Quantum Migration by Data Sensitivity

    Qryptonic Launches Q-Scout 26 to Prioritize Post-Quantum Migration by Data Sensitivity

    Qryptonic Launches Q-Scout 26 to Prioritize Post-Quantum Migration by Data Sensitivity

    PR Newswire

    MIAMI, Jan. 14, 2026 /PRNewswire/ — Qryptonic LLC today announced the release of Q-Scout 26, a platform developed to help enterprises assess their long-term cryptographic exposure. As organizations prepare for the transition to post-quantum cryptography, Q-Scout 26 provides autonomous inventory of cryptographic usage and evaluates potential vulnerabilities based on data sensitivity, retention periods, and projected threat scenarios.

    Based on recent authorized enterprise assessments across large, IP-intensive environments, Qryptonic consistently observed a common pattern: cryptography was widely deployed, but cryptographic decisions were not aligned with how long the underlying data remains sensitive. Systems protecting decades-long intellectual property were frequently treated the same as short-lived operational traffic, resulting in materially different risks being managed as equivalent.

    Unlike traditional vulnerability scanners that flag cryptography as “weak” or “strong,” Q-Scout 26 is designed to produce prioritized migration roadmaps. The platform distinguishes between systems using identical algorithms but protecting data with vastly different lifespans and business impact, enabling decision-grade prioritization rather than undifferentiated findings.

    “Every other tool tells you what’s broken today. Q-Scout tells you what breaks next, how severe the exposure could be, and where to spend your budget first,” said Elliot Jung, Vice Chairman, Cybersecurity at Qryptonic, and Cybersecurity Specialist affiliated with Brookhaven National Laboratory. “That’s the difference between a vulnerability list and a migration roadmap. CISOs don’t need more findings. They need actionable decisions.”

    Q-Scout 26 provides a structured approach to assessing “Harvest Now, Decrypt Later” risk by translating cryptographic configurations and data attributes into time-based exposure profiles. Its autonomous discovery engine detects assets, cloud services, and third-party dependencies that are commonly overlooked in manual inventories, mapping cryptographic usage across identified components.

    “What stands out across these environments isn’t a lack of encryption, but a lack of prioritization,” said Garrett Melich, Member of Qryptonic’s Defense Innovation Council, who spent more than two decades with the CIA. “Organizations are protecting data with vastly different lifespans using the same cryptographic foundations. Quantifying that difference is what turns quantum readiness from a theoretical concern into an actionable program.”

    Federal agencies have begun taking steps toward post-quantum cryptographic transition. OMB Memorandum M-23-02 directs agencies to inventory their cryptographic systems, while NSA CNSA 2.0 outlines transition guidelines for national security systems. Comparable requirements have, in the past, influenced practices in regulated private-sector environments.

    Q-Scout 26 is available for enterprise and regulated-industry engagements.

    Website: https://qryptonic.com/

    About Qryptonic

    Qryptonic is a U.S.-based cybersecurity firm founded in 2024, focused on post-quantum readiness, cryptographic risk discovery, and enterprise migration strategy. The company works with regulated, IP-intensive organizations across critical infrastructure and technology sectors. Qryptonic’s advisory leadership includes former national security, defense, and enterprise cybersecurity executives. The company is headquartered in Miami and supports deployments across North America and Europe.

    Contact
    Jessica Gold
    Jessica.gold@qryptonic.com

    Logo: https://mma.prnewswire.com/media/2861674/Qryptonic_LLC_Logo.jpg

    Cision View original content to download multimedia:https://www.prnewswire.com/news-releases/qryptonic-launches-q-scout-26-to-prioritize-post-quantum-migration-by-data-sensitivity-302661278.html

    SOURCE Qryptonic LLC

  • FASTECH Advances FASTMAX Hydrogen Fueling System to Final Assembly Phase

    FASTECH Advances FASTMAX Hydrogen Fueling System to Final Assembly Phase

    FASTECH Advances FASTMAX Hydrogen Fueling System to Final Assembly Phase

    PR Newswire

    FOUNTAIN VALLEY, Calif., Jan. 14, 2026 /PRNewswire/ — FASTECH, a leading EPCM energy solutions company, has reached major production milestones on its FASTMAX Transportable Hydrogen Fueling Station, a modular, high-performance system designed to expand hydrogen accessibility across the U.S.

    Milestone Progress

    In partnership with Kwik Equipment (Pearland, TX), FASTECH has completed trailer fabrication and mounted the core hydrogen components — the Maximator 1.5 Compression Module and Kustec Racoon 45 Hydrogen Chiller — on twist-lock connectors for stability and mobility.

    The 50-foot triple-axle step-deck trailer includes a concealed cable tray, barrier wall for electrical panels, and reinforced infrastructure for high-pressure hydrogen operations.

    “FASTMAX represents our commitment to building scalable, deployable hydrogen fueling solutions that accelerate the adoption of clean mobility,” said Robert Awbrey, Vice President of FASTECH.

    Next Phase: Final Assembly at FASTECH HQ

    The trailer will now move to FASTECH’s Fountain Valley facility for final integration, including:

    • Bennett High Flow Hydrogen Dispenser
    • Electrical & Mechanical
    • Factory Acceptance Testing

    Once completed, FASTMAX will deliver up to 700 bar fueling following the SAE J2601 protocol, with integrated flame detection and cooling systems.

    About FASTMAX

    Built on Maximator’s compressor technology, FASTMAX is a fully transportable, self-contained hydrogen fueling station that compresses, stores, cools, and dispenses hydrogen at both light- and heavy-duty fueling pressures.

    Key Specs:

    • Capacity: Up to 110 kg/hr @ 500 bar inlet
    • Storage: 40 kg @ 1000 bar
    • Power: 200 kW, 480 VAC, 3 phase, 60Hz
    • Operating Temp: –20°C to +40°C
    • Noise Level: <70 dB at 10m

    Driving the Hydrogen Economy Forward

    As the leading builder of hydrogen and CNG stations in the U.S., FASTECH continues to pioneer safe, high-performance fueling infrastructure. The company has engineered and built over 50 hydrogen stations.

    “FASTMAX brings together world-class partners like Kwik, Bennett, Maximator, and Kustec, to deliver a compact, flexible fueling platform built for the next era of hydrogen mobility,” said Pete Pugnale, FASTECH Business Development Lead.

    About FASTECH

    FASTECH is an Engineering, Procurement, Construction, and Maintenance (EPCM) company specializing in hydrogen, CNG, and other renewable energy infrastructure. With more than 25 years of experience, FASTECH delivers innovative, safe, and efficient energy systems that power the transition to cleaner fuels.

    Users can learn more at www.fastechus.com.

    Contact

    Robert Awbrey
    Fastech
    rawbrey@fastechus.com

    Photo – https://mma.prnewswire.com/media/2861615/FASTECH_Photo.jpg
    Logo – https://mma.prnewswire.com/media/2861614/FASTECH_Logo.jpg 

    Cision View original content to download multimedia:https://www.prnewswire.com/news-releases/fastech-advances-fastmax-hydrogen-fueling-system-to-final-assembly-phase-302661187.html

    SOURCE FASTECH

  • Crypto-Globe.com Introduces a New Feature Called Crypto Challenge

    Crypto-Globe.com Introduces a New Feature Called Crypto Challenge

    Crypto-Globe.com Introduces a New Feature Called Crypto Challenge

    PR Newswire

    PRAGUE, Jan. 14, 2026 /PRNewswire/ — The online portal Crypto-Globe.com is expanding its features with a new interactive gaming section called Crypto Challenge. This new feature combines a fun, simple game with the opportunity for users to enter a raffle for valuable prizes. The aim of the new feature is to offer readers another way to actively engage with the world of cryptocurrencies and finance.

    Crypto Challenge is a simple arcade game based on collecting points. During the game, users catch falling objects that represent various elements of the financial world. Each symbol has a specific point value that counts towards the total score.

    The game features diamonds, bitcoin, and ETFs, which increase the score, as well as symbols that decrease the score. The goal is to achieve the highest number of points in a single game session.

    Prize in Crypto Challenge

    The new Crypto Challenge feature offers Apple AirPods 4 with active noise cancellation (2024) as a prize. All users who fill in the required information on the Crypto-Globe website according to the instructions on the page, play the Crypto Challenge game, and achieve a score will be entered into the draw. Participation takes place directly through the website and the associated form.

    New feature as part of platform development

    The introduction of Crypto Challenge represents a further expansion of the features of Crypto-Globe.com. The new gaming section is intended to complement the existing content and offer users an alternative form of engagement.

    About Crypto-Globe

    Crypto-Globe.com is an international online portal focused on cryptocurrencies, blockchain, financial markets, and investment topics. The website publishes current news, analyses, comments, and educational content.

    The content on Crypto-Globe.com is available in multiple languages, allowing it to reach readers from different countries and regions.

    Contact
    Hynek Král
    Almina Corp a.s.
    support@alminacorp.com 

    Photo – https://mma.prnewswire.com/media/2861584/Crypto_Challenge_Crypto_Globe.jpg
    Photo – https://mma.prnewswire.com/media/2861583/Crypto_Globe_com.jpg

     

    Cision View original content to download multimedia:https://www.prnewswire.com/news-releases/crypto-globecom-introduces-a-new-feature-called-crypto-challenge-302661169.html

    SOURCE Crypto-Globe.com

  • SpyCloud Launches Supply Chain Solution to Combat Rising Third-Party Identity Threats

    SpyCloud Launches Supply Chain Solution to Combat Rising Third-Party Identity Threats

    SpyCloud Launches Supply Chain Solution to Combat Rising Third-Party Identity Threats

    PR Newswire

    AUSTIN, Texas, Jan. 14, 2026 /PRNewswire/ — New monitoring capability delivers unprecedented visibility into vendor identity exposures, moving enterprises and government agencies from static risk scoring to protecting against actual identity threats. 

    SpyCloud, the leader in identity threat protection, today announced the launch of its Supply Chain Threat Protection solution, an advanced layer of defense that expands identity threat protection across the extended workforce, including organizations’ entire vendor ecosystems. Unlike traditional third-party risk management platforms that rely on external surface indicators and static scoring, SpyCloud Supply Chain Threat Protection provides timely access to identity threats derived from billions of recaptured breach, malware, phished, and combolist data assets, empowering organizations – from enterprise security teams to public sector agencies – to act on credible threats rather than simply observe and accept risk.

    Supply Chain Threat Protection addresses a critical gap in enterprise security: the inability to maintain real-time awareness of identity exposures affecting third-party partners and vendors. According to the 2025 Verizon Data Breach Investigations Report, third-party involvement in breaches doubled year-over-year, jumping from 15% to 30% primarily due to software vulnerabilities and weak security practices. As supply chain compromises continue to escalate, security teams need intelligence that goes beyond questionnaires and external scans to reveal active threats like phishing campaigns targeting their trusted partners, confirmed credential theft, and malware-infected devices exposing critical business applications to criminals. 

    YouTube: https://youtu.be/wo7MqWbUCZ4?utm_medium=pr&utm_source=cybernewswire&utm_content=video&utm_campaign=supply-chain-launch-2026 

    For government agencies and critical infrastructure operators, supply chain threats present national security risks that demand heightened vigilance. Public sector organizations managing sensitive data and critical services increasingly rely on contractors and technology vendors whose compromised credentials could provide adversaries with pathways into classified systems or essential infrastructure. Last year alone, the top 98 Defense Industrial Base suppliers had over 11,000 dark web exposed credentials – an 81% increase from the previous year. SpyCloud Supply Chain Threat Protection enables federal, state, and local agencies to identify when suppliers or contractors have been compromised – allowing them to take proactive measures before an identity exposure escalates into a matter of national security.

    “Third-party threats have evolved far beyond what traditional vendor assessment tools can detect,” said Damon Fleury, Chief Product Officer at SpyCloud. “Public and private sector organizations need to know when their vendors’ employees are actively compromised by malware or phishes, when authentication data is circulating on the dark web, and which partners pose the greatest real downstream threat to their business. Our new solution delivers those signals by transforming raw underground data into clear, prioritized actions that security teams use to protect their organization.”

    Supply Chain Threat Protection enables organizations and agencies to continuously monitor thousands of suppliers, with each company’s threats enumerated in detail, and also represented in an at-a-glance Identity Threat Index. The Index is a comprehensive and continuously updated analysis that quantifies vendor security posture through the lens of identity exposure, from both active and historical phishing, breach, and malware sources, and surfaces which partners pose the most significant risk based on verified dark web intelligence.

    Key Capabilities Include:

    • Real Evidence of Compromise: Timely recaptured identity data from breaches, malware, and successful phishes collected continuously from the criminal underground, with context that gives security teams enhanced visibility into the identity threats facing suppliers today.
    • Identity Threat Index: Aggregates multiple verified data sources weighted by the recency, volume, credibility, and severity of compromise, emphasizing verified identity data over static breach records for more robust and real-time visibility into vendor risk.
    • Compromised Applications: Identifies the internal and third-party business applications exposed on malware-infected supplier devices to support deeper investigation and risk assessment.
    • Enhanced Vendor Management and Communications: Facilitates sharing of actionable evidence and detailed executive-level reports directly with vendors to collaboratively improve security posture, transforming vendor relationships from adversarial scoring to collaborative protection.
    • Integrated Response: Leveraging SpyCloud’s console, teams now have access to identity threat protection beyond the traditional employee perimeter with this extension to suppliers, allowing analysts to respond to workforce identity threats within a single tool. 

    SpyCloud Supply Chain Threat Protection is designed to support multiple use cases across Security Operations, Infosec, Vendor Risk Management, and GRC teams. Organizations can leverage the solution for vendor due diligence during procurement and onboarding, continuous risk reviews to strengthen vendor relationships, and accelerated incident response when vendor exposures threaten their own environments.

    “Security teams and their counterparts across the business are overwhelmed with vendor assessments, questionnaires, and risk scores that often don’t translate to real prevention,” said Alex Greer, Group Product Manager at SpyCloud. “Our customers have often reported that when they’re evaluating doing business with a new vendor, they lack the actionable data their legal and compliance teams need for evidence-based decision making. That’s where SpyCloud stands out. Surfacing verified identity threats tied directly to vendor compromise, letting teams escalate to leadership when to restrict data access and prioritize efforts for the greatest impact on reducing organizational risk.”

    Unlike existing solutions that rely on external surface indicators and static scoring, SpyCloud provides threat data derived from underground sources – the same recaptured darknet identity data that criminals actively use to target organizations and agencies. This fundamental difference enables SpyCloud customers to move from passive risk acceptance to proactive and holistic identity threat protection.

    To learn more about defending organizations from the exposures of vendors and suppliers, registration is open for SpyCloud’s upcoming Live Virtual Event, Beyond Vendor Risk Scores: How to Solve the Hidden Identity Crisis in Your Supply Chain, on Thursday, January 22, 2026, at 11 am CT

    About SpyCloud

    SpyCloud transforms recaptured darknet data to disrupt cybercrime. Its automated identity threat protection solutions leverage advanced analytics and AI to proactively prevent ransomware and account takeover, detect insider threats, safeguard employee and consumer identities, and accelerate cybercrime investigations. SpyCloud’s data from breaches, malware-infected devices, and successful phishes also powers many popular dark web monitoring and identity theft protection offerings. Customers include seven of the Fortune 10, along with hundreds of global enterprises, mid-sized companies, and government agencies worldwide. Headquartered in Austin, TX, SpyCloud is home to more than 200 cybersecurity experts whose mission is to protect businesses and consumers from the stolen identity data criminals are using to target them now.

    To learn more and see insights on your company’s exposed data, users can visit spycloud.com.

    Contact 

    Media Specialist
    Phil Tortora
    REQ on behalf of SpyCloud
    spycloud@req.co 

    Photo: https://mma.prnewswire.com/media/2861417/SpyCloud_Logo.jpg

    Cision View original content to download multimedia:https://www.prnewswire.com/news-releases/spycloud-launches-supply-chain-solution-to-combat-rising-third-party-identity-threats-302660830.html

    SOURCE SpyCloud

  • GitGuardian Closes 2025 with Strong Enterprise Momentum, Protecting Millions of Developers Worldwide

    GitGuardian Closes 2025 with Strong Enterprise Momentum, Protecting Millions of Developers Worldwide

    GitGuardian Closes 2025 with Strong Enterprise Momentum, Protecting Millions of Developers Worldwide

    PR Newswire

    NEW YORK, Jan. 14, 2026 /PRNewswire/ — Leading secrets security platform sees accelerated adoption across Fortune 500, with 60% of new customers choosing multi-year commitments.

    GitGuardian, the leading secrets and Non-Human Identity security platform, today announced record growth in ARR and customer expansion throughout 2025, reinforcing its position as the enterprise standard for protecting code, collaboration tools, and cloud infrastructure from exposed secrets and credentials.

    With 70% of its revenue coming from the US, GitGuardian’s momentum in North America continued to accelerate in 2025, as the region accounted for over 80% of new ARR.

    Enterprise Trust & Adoption

    GitGuardian’s momentum was driven by deep adoption among global enterprise customers, including:

    • Deutsche Telekom
    • BASF
    • A leading enterprise cloud platform provider with 25,000+ employees globally headquartered in the USA
    • A major technology-enabled mobility and delivery platform with 30,000+ employees worldwide headquartered in the USA
    • A global pharmaceutical and biotechnology company with 90,000+ employees, headquartered in Europe
    • A major enterprise software vendor with 110,000+ employees
    • Leading financial services cooperative with 55,000+ employees in North America

    Demonstrating confidence in GitGuardian’s long-term value, +60% of new enterprise customers signed multi-year agreements in 2025.

    Platform Scale & Coverage

    GitGuardian’s Secrets Security platform now protects:

    • More than 115K developers across enterprise customers globally.
    • More than 610K enterprises’ repositories continuously monitored for exposed secrets.
    • More than 210K connected collaboration tool sources, including Slack, Jira, Confluence, and major cloud platforms, this is 7 times 2024 number.
    • More than 16M free users’ repositories, 40% more than in 2024.

    The platform detected and helped enterprises remediate 350K new potential secret exposures in 2025 alone, preventing security incidents before they could impact customers. It also remediated 5x more secrets than in 2024.

    Strong Global & Sector Growth

    The company strengthened its leadership in Technology & Telecommunications, its core and most mature market, while achieving deep adoption across highly regulated industries including Financial Services, Healthcare, and Insurance, where stringent security and compliance requirements drive platform value.

    GitGuardian’s customer base also reflects strong industry diversification, spanning Energy, Manufacturing, Media, Retail, and Professional Services sectors.

    Customer Success & Retention

    GitGuardian maintained industry-leading customer retention, with customers expanding their use of the platform’s capabilities, including:

    • Digital Ocean
    • Orange

    “GitGuardian Platform has helped save significant time for the security team by eliminating the need to seek out development teams and work with them on exposed secrets, as much of this is now handled proactively.” Ari Kalfus Senior Manager, Product Security at DigitalOcean”At the scale of a large enterprise, we wanted to ensure our secrets management approach would meet regulatory standards well ahead of future requirements” Grégory Maitrallain, Solution Architect at Orange Business

    Looking Ahead

    “Enterprise security teams are recognizing that secrets sprawl across their entire development ecosystem—from code repositories to collaboration tools to AI coding assistants,” said Eric Fourrier, CEO at GitGuardian. “Our customers are not just buying a point solution, but investing in a comprehensive Non-Human Identity security platform that scales with their business, which is why we’re seeing such strong multi-year commitment.”

    About GitGuardian

    GitGuardian is an end-to-end NHI Security platform that empowers software-driven organizations to secure their Non-Human Identities (NHIs) and comply with industry standards. With attackers increasingly targeting NHIs, such as service accounts and applications, GitGuardian integrates Secrets Security and NHI Governance. This dual approach enables the detection of compromised secrets across your dev environments while also managing non-human identities and their secrets’ lifecycles. The platform is the world’s most installed GitHub application and supports over 550+ types of secrets, offers public monitoring for leaked data, and deploys honeytokens for added defense. Trusted by over 600,000 developers, GitGuardian is the choice of leading organizations like Snowflake, ING, BASF, and Bouygues Telecom for robust secrets protection.

    Contact

    Sr. Partner
    Holly Hagerman
    Connect Marketing
    hollyh@connectmarketing.com

    Photo: https://mma.prnewswire.com/media/2861459/GitGuardian.jpg

    Cision View original content to download multimedia:https://www.prnewswire.com/news-releases/gitguardian-closes-2025-with-strong-enterprise-momentum-protecting-millions-of-developers-worldwide-302660948.html

    SOURCE GitGuardian