News

Ernst & Young has conducted an analysis of the impact of cyber breaches on a company and found that companies typically see a ...
A Windows NTLM vulnerability patched in March has been exploited in attacks targeting government and private institutions.
With unapproved AI tools entrenched in daily workflows, experts say it’s time to shift from monitoring to managing Shadow AI ...
In a secret meeting between Chinese and US officials, the former confirmed conducting cyberattacks on US infrastructure.
“In addition to discovering the vulnerability, Microsoft also found that the exploit has been deployed by PipeMagic malware.
Van Horenbeeck’s career spans some of the biggest companies in tech: Verizon, Microsoft, Google, Amazon, Zendesk, and now SVP ...
Hertz Corporation warned customers of the Hertz, Thrifty, and Dollar brands that their personal information was exposed in a ...
MITRE warns of a deterioration of national vulnerability databases and advisories, slowed vendor reaction and limited ...
Servers exposed to complete takeover due to CVE-2025-32433, an unauthenticated remote code execution flaw in Erlang/OTP ...
The potential risks of mobile apps to enterprises include data exposure, compliance violations, reputational damage, and ...
AI-generated code tools are creating fake package names—opening the door to ‘slopsquatting’ attacks and pose a growing supply ...
Security Posture Management (SPM) is shaping up to be the latest “must-have” in the cybersecurity strategy toolkit.