We’ve been busy securing identities, building solutions, and growing globally. Now it’s time our website caught up. New Trevonix.com launching soon.

Trevonix on Ping Identity’s AI-Driven Trust Framework: Securing the Future of Enterprise Identity

Ping Identity’s AI-Driven Trust Framework

Ping Identity has introduced its AI-Driven Trust Framework, a new approach to enterprise security built for the AI era. The framework integrates AI-powered risk analysis, adaptive authentication, and identity intelligence to help organizations strengthen defenses while enabling seamless digital experiences. By unifying signals across users, devices, and applications, the framework delivers real-time trust decisions that […]

Okta Unveils New Identity Innovations to Secure AI-Driven Enterprises and Combat Fraud

Okta Unveils New Identity Innovations to Secure AI-Driven Enterprises and Combat Fraud

Okta is redefining enterprise security for the AI era. Its latest innovations across the Customer Identity Cloud (Auth0) and Workforce Identity Cloud focus on managing the rise of AI agents and non-human identities. The new Cross App Access (XAA) framework enables secure, verified interactions between AI systems, while tamper-proof digital credentials strengthen authentication for humans […]

OpenAI ShadowLeak Vulnerability Patched

OpenAI ShadowLeak Vulnerability Patched

In September 2025, a security research firm named Radware revealed a critical zero-click vulnerability in OpenAI’s ChatGPT Deep Research agent. This flaw, dubbed ShadowLeak, exposed a new kind of threat: a service-side data leak that could exfiltrate private information directly from OpenAI’s cloud infrastructure—with no user interaction required. OpenAI responded by patching the vulnerability in […]

Microsoft & Cloudflare Disrupt RacoonO365 Phishing Operation

Microsoft & Cloudflare Disrupt RacoonO365 Phishing Operation

In a coordinated effort, Microsoft’s Digital Crimes Unit (DCU) and Cloudflare have successfully disrupted one of the fastest-growing Phishing-as-a-Service (PhaaS) operations — RaccoonO365 (also tracked by Microsoft as Storm-2246). This takedown involved the seizure of 338 domains and the dismantling of supporting infrastructure, cutting off access to a phishing platform that had stolen thousands of […]

Cisco ASA Zero-Day Flaws Under Active Exploitation

Cisco ASA Zero-Day Flaws Under Active Exploitation

In late September 2025, Cisco disclosed that two critical zero-day vulnerabilities in its Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) systems are under active exploitation in the real world. These flaws pose serious risks to network perimeter security across public and private sector environments. In this blog, we break down the facts, technical […]

FBI Warns Salesforce Users of Fresh Attacks

FBI Warns Salesforce Users of Fresh Attacks

Salesforce has long been a cornerstone for many businesses’ customer relation, sales, and service infrastructure. But in recent months, the platform has become a prime target for sophisticated threat actors. The FBI has issued urgent alerts warning Salesforce users of new campaigns aimed at stealing data and extorting organizations via compromised Salesforce instances. If your […]